Third-Party Cyber Risk Management: Automating Product and Service Specific Assessments

Third Party Cyber Risk Management: Automating Product and Service Specific Assessments Digital transformation and an inter-connected supply chain that leverages third-party software to fulfill business needs is placing a high priority on assessing third parties and their services.    Traditional third-party risk assessments and first-generation security ratings products do not provide the level of visibility […]

Four Questions Your Board Will Ask You About Cyber Risk

Four Questions Your Board Will Ask You About Cyber Risk Board members today are increasingly concerned with cybersecurity risks. Recent Gartner research found “Eighty-eight percent of Boards of Directors (BoDs) view cybersecurity as a business risk, as opposed to a technology risk, according to a new survey* from Gartner, Inc.” It’s not surprising given the […]

How Integrated Cyber Risk Management Helps Your Organization

In today’s world, organizations need to have accurate and complete visibility into their entire asset inventory, associated vulnerabilities, and threat landscape, including third-party risks, to understand their complete risk exposure levels to develop a plan for improved cyber risk management outcomes. The problem is, there are a lot of risk management solutions that claim to […]

Cyber Risk Scoring- The FortifyData Scoring Methodology

A cyber risk score is a benchmark score or rating of an organization’s level of risk exposure based on the liabilities related to cybersecurity and IT vulnerabilities. These vulnerabilities can include attack surface (external), internal vulnerabilities (patching, IOCs, port management, etc.), human and environmental risk, vendor/third party risk management processes and more. The cyber risk […]

5 Ways to Protect Your Company Against Ransomware

5 Ways to Protect Your Company Against Ransomware Every day companies are hit with new and mutating ransomware attacks with exponentially increasing financial impacts. According to Forbes, the average cost to recover from a successful ransomware attack doubled from approximately $41,000 per incident to over $84,000.     Traditionally, ransomware attacks involved sensitive data encrypted by actors and released […]

Cybersecurity Risk Assessment Basics

About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.

3 Ways to Prevent Third-Party Cyber Security Risk

3 Ways to Prevent Third-Party Cyber Security Risk While this pandemic has caused a lot of angst and change in business, there are some lessons that can be learned from how we are trying to stop the spread of COVID-19. What we have learned is that the best way to stop the spread of this […]

Not All Third-Party Relationships are Created Equal

Not All Third-Party Relationships are Created Equal Third-party risk management programs require you to explore your businesses suppliers cybersecurity posture. It is no longer sufficient for businesses to only secure their internally-controlled infrastructure and services. You must also diligently evaluate the security policies and procedures of their third parties to reduce cyber risk. Organizations interact […]