Third-Party Risk Management Essentials

Data Breach Today

Mark Sangster of eSentire Shares Lessons Learned Third-party vendor risk continues to pose a security challenge to organizations.

Risk 213

Risks of Password Managers

Schneier on Security

Stuart Schechter writes about the security risks of using a password manager. My particular choices about security and risk is to only store passwords on my computer -- not on my phone -- and not to put anything in the cloud. passwordsafe passwords riskassessment risks

OnDemand Webinar | Integrating Information Risk Management into Business Risk Management

Data Breach Today

Learn about trends in information security risk assessment that align with business risk.

Third-Party Risk Management: The Pitfalls

Data Breach Today

Ryan Davis of Veracode Describes Common Mistakes, Outlines Effective Strategies Security practitioners often overlook the risks of third-party resources, says Ryan Davis of Veracode, who outlines the biggest potential pitfalls and describes effective risk management techniques

Risk 164

Medical Devices: Finding the Risks

Data Breach Today

Researcher Jesse Young on Efforts to Improve Device Security Recently, the FDA was forced to recall a series of insulin pumps because of cybersecurity vulnerabilities that could have left the devices open to hackers.

Risk 168

The Costs and Risks of Account Takeover

Data Breach Today

These are the costs and risks associated with ATO What Can be Done About ATO Attacks? Account takeover (ATO) attacks result in billions of dollars of fraud and damage to brand reputation each year.

Risk 160

CISO Notebook: Third-Party Risk

Data Breach Today

Cris Ewell of UW Medicine on Managing Vendor Risks Where is the data, who has access to it, and how is it being secured? These are among the top questions inherent in any third-party risk program. Cris Ewell, CISO of UW Medicine, shares insight from his experience managing vendor risk

Risk 148

The Risk of Weak Online Banking Passwords

Krebs on Security

If you bank online and choose weak or re-used passwords, there’s a decent chance your account could be pilfered by cyberthieves — even if your bank offers multi-factor authentication as part of its login process.

Responding to Threats Based on Business Risks

Data Breach Today

But how can organizations prioritize the threats and respond based on business risks? Craig Harber of Fidelis Cybersecurity on Addressing Emerging Threats Nation-state actors, cybercriminals, hacktivists - each of these adversaries poses threats to enterprises.

Risk 160

Phishing: Mitigating Risk, Minimizing Damage

Data Breach Today

In Wake of Recent Incidents, Experts Offer Insights on Critical Steps to Take As phishing attacks continue to menace healthcare and other business sectors, security experts say organizations must take critical steps to prevent falling victim and help limit the potential damage

Managing Open Source Risks

Data Breach Today

But with increased speed comes greater risks, says Chris Eng of CA Veracode, who offers insights on mitigating those risks Chris Eng of CA Veracode on Best Practices Open source and third-party components help developers build and deploy applications faster.

Risk 163

Managing IoT Risks: Reinventing Security

Data Breach Today

Security needs to be reinvented for the internet of things, and start-up companies can play a critical role, says Robin Saxby, the former CEO and founder of Arm Holdings, a U.K.-based based semiconductor company, who now invests in start-up firms

IoT 137

Security Risks of Chatbots

Schneier on Security

Good essay on the security risks -- to democratic discourse -- of chatbots. lies nationalsecuritypolicy propaganda risks

Risk 84

Report Highlights Risk of Medical Device 'Workarounds'

Data Breach Today

Experts: Problems at VA Medical Center Are Common at Many Healthcare Entities A watchdog agency review of a VA medical center in California spotlights security issues involving medical device "workarounds" that some experts say are common but often overlooked or underestimated risks

Risk 159

Travel Card Data Release Risked Australians' Privacy

Data Breach Today

But a recent incident in Australia put the privacy of millions of public transport travelers at risk after steps weren't taken to properly anonymize three years of travel records, Victoria's information commissioner has found

Risk 148

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

Third party cyber risk is growing. In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment.

Risk 52

Using AI to Proactively Address Third-Party Risk

Data Breach Today

Microsoft's Abbas Kudrati Shares Recommendations Third-party risk assessments need to be ongoing, and artificial intelligence can play an important role, says Microsoft's Abbas Kudrati

Mitigating the Risks Posed by Malicious Insiders

Data Breach Today

Risk 160

Analysis: The Cybersecurity Risks Major Corporations Face

Data Breach Today

The latest edition of the ISMG Security Report features a deep dive into an analysis of the cybersecurity risks that publicly traded companies face.

Healthcare Security: Tactics for Reducing Risk

Data Breach Today

IBM's Christopher Bontempo on Where to Focus for Quick Results Reducing risk is a tall order, but IBM's Christopher Bontempo says healthcare security leaders can get immediate and measurable results by concentrating on two aspects: data security and incident response

Risk 156

Third-Party Risk Management: NY DFS Regulation Compliance

Data Breach Today

Ted Augustinos of Locke Lord LLP Addresses the Challenges Defining the scope of third-party risk is challenging, says Ted Augustinos of Locke Lord LLP, who discusses compliance with the New York Department of Financial Services' cybersecurity regulation

Election Security Program Aims to Mitigate Ransomware Risks

Data Breach Today

Department of Homeland Security to Help With Database Protections Within a month, the U.S. Department of Homeland Security hopes to launch a program to help states protect voter registration databases and systems in advance of the 2020 presidential election.

Managing Third-Party Risks

Data Breach Today

Bitsight's Tom Turner on Security Ratings Managing third-party risks is more critical than ever, says Tom Turner of BitSight Technologies, who discusses the urgency of communicating that to the board

Risk 155

Patch Management as a Risk Management Strategy

Data Breach Today

Chris Hallenbeck of Tanium Discusses Good Security Hygiene Significant security events have many techniques in common, says Chris Hallenbeck of Tanium, who describes why security hygiene improvement, especially patch management, is so essential

Improving Vendor Risk Management

Data Breach Today

NYKA Advisory Services' Sunil Chandiramani Offers Insights for Financial Institutions Providing vendors with visibility to a company's systems makes the vendor management process far more complicated, says Sunil Chandiramani of NYKA Advisory Services

Risk 155

Maximize Cybersecurity Risk Ratings in 2019

Data Breach Today

Insights from the Forrester New Wave: Cybersecurity Risk Rating Solutions, Q4 2018. If you are a security or risk leader, you know that even with a formal third-party risk program in place, you are not effectively keeping track of all of your third parties

Risk 171

Solving 3rd Party Cybersecurity Risk

Data Breach Today

Your organization's risk surface may be larger than you think. Your organization's risk surface is larger than you think. How can you get a handle on what risks exist, where they reside, and which ones are most important to resolve immediately

Risk 140

HHS Updates Security Risk Assessment Tool

Data Breach Today

But Why Is Conducting a Risk Analysis So Challenging for So Many Organizations? But why is conducting a risk assessment so challenging for so many

Tools 174

Vendor Security Risk Management: A Growing Concern

Data Breach Today

Eddie Chang, Travelers Insurance, cyber insurance, Quest Diagnostics, Optum360, breach, Labcorp, BioReference, AMCA, American Medical Collections Agency, vendor risk management, application security

Hostinger: 14 Million Accounts at Risk After Breach

Data Breach Today

Web Hosting Company Says API Server Compromised Web hosting company Hostinger has reset all customer passwords after one of its databases was breached, affecting 14 million accounts. The intruder gained access to an authorization token that allowed access to a customer database, the company says

Risk 215

Tips on Countering Insider Threat Risks

Data Breach Today

Insider threats are difficult to counter. What happens when an employee goes rogue, and how do you catch them? Charles Carmakal of Mandiant, who says his firm is dealing with more insider threat investigations, shares tips for better defenses

Tips 123

Tackling the Prevalent Fraud Risks

Data Breach Today

Dora Gomez on the Highlights of ACFE Report to Nations What are the prevailing fraud trends, and how are they impacting consumers, clients and enterprises?

Risk 163

Email Servers: Exim Flaw Leaves Millions at Risk of Hacking

Data Breach Today

Remotely Executable Flaw Could be Exploited by BEC and Ransomware Attackers Email server alert: Linux and Unix administrators should immediately patch a remotely exploitable flaw in Exim, one of the world's most-used message transfer agents, security experts warn.

Risk 181

Future-Proofing for IoT Risks

Data Breach Today

Check Point's Robert Falzon on Preparing for the Changes to Come The internet of things promises to change how enterprises operate - as well as the cybersecurity risks they will face. Robert Falzon of Check Point Software Technologies outlines IoT risks and how to prepare to mitigate them

IoT 149

Remote Desktop Protocol: The Security Risks

Data Breach Today

In the past year, cybercriminals behind two of the biggest ransomware attacks have abandoned other techniques in favor of exploiting remote desktop protocol. Matt Boddy of Sophos explains why RDP attacks are so popular - and what you can do to discourage them

Risk 123

Cybersecurity Incident Response and Managing Risk

Data Breach Today

IBM's Anup Kanti Deb Offers Insights Incident response is an ongoing process, a lifecycle that requires a risk mitigation strategy covering operational, legal and reputational risk

Risk 129

Mitigating Emerging Risks

Data Breach Today

Chris Testa of Cybereason on Going Beyond Defense-in-Depth As businesses change their key strategies, they must ensure they mitigate new risks that emerge, says Chris Testa of Cybereason.

Risk 130

Cyberattack Risk: Scans Find Big Businesses Exposed

Data Breach Today

Britain's biggest businesses continue to inappropriately expose servers and services to the internet, putting the organizations and data at risk, according to a study by Rapid7. Tod Beardsley describes the findings, including a widespread lack of phishing defenses as well as cloud misconfigurations

Risk 142

5G Networks Spark Concerns For Enterprise Risks

Threatpost

As 5G deployments continue to increase, what are the top security risks for enterprises? Hacks IoT Podcasts 5G enterprise risk GSMA mobile360 network deploymentsWe discuss with an expert during GSMA's Mobile360 conference.

Risk 113

How Risk Management Is Evolving

Data Breach Today

Jennifer Bayuk of Decision Framework Systems on Putting Principles Into Practice How is risk management evolving as a result of ubiquitous cybersecurity risks?

Risk 130