Third-Party Cyber Risk Management: Automating Product and Service Specific Assessments
Tips for automating your third-party cyber risk management program that focuses on in-scope products and services.
Four Questions Your Board Will Ask You About Cyber Risk
Here are the top 4 questions you should expect board members to ask you, and how you can best answer them.
How Integrated Cyber Risk Management Helps Your Organization
In today’s world, organizations need to have accurate and complete visibility into their entire asset inventory, associated vulnerabilities, and threat landscape, including third-party risks, to understand their complete risk exposure levels to develop a plan for improved cyber risk management outcomes. The problem is, there are a lot of risk management solutions that claim to […]
Cyber Risk Scoring- The FortifyData Scoring Methodology
Cyber risk scoring and security rating methodology for FortifyData security rating. Description of score ranges explained.
5 Ways to Protect Your Company Against Ransomware
It is critical that organizations prioritize defending their networks against ransomware attacks. Find out how.
Cybersecurity Risk Assessment Basics
About the Author: Anthony Ortega has more than 20 years of experience in cybersecurity, configuration management, systems engineering, and project management. He is currently nearing completion of his doctor of management in information systems technology degree.
Selecting a Third-Party Risk Management System That Fits Your Business
Selecting a third-party vendor risk management system is essential in today’s market. Learn why and how to do it.
Cyber Attacks: The New Snow Day
3 Ways to Prevent Third-Party Cyber Security Risk
Third party cybersecurity risk strategy can learn from the ways to stop COVID-19 – that is to prevent the spread of cyber attacks from other companies. Learn more.
Not All Third-Party Relationships are Created Equal
Third-party risk management program success is based on three components: accuracy, efficiency and relevancy.