Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Close Encounters of the Third (and Fourth) Party Kind Wade Baker, Partner, Cyentia Institute | Vanessa Sorenson, Sr. Product Marketing Manager, SecurityScorecard Mitigating risks between your third- and fourth-party vendors SecurityScorecard and the Cyentia Institute teamed up to analyze data from SecurityScor... February 21, 2023 4:30pm Demo: Automatic Vendor Detection (AVD) Deep Dive Maya Kano, Solutions Architect; Vanessa Sorenson, Senior Product Marketing Manager Go beyond traditional TPRM to automate and scale your third-party and fourth-party risk management workflows. Join SecurityScorecard in this deep di... 3 months ago | 23 mins Webinar: Monitor & Manage Supply Chain Risk Wes Loeffler, Product Manager, Archer & Mark Nafe, Director, Solutions Consulting, RiskRecon Today, the average cost of the fallout from a multi-party data breach is $90 million and it continues to rise. In addition, 59% of data breaches are d... 3 months ago | 56 mins Fourth Parties And Beyond: Managing Risk In The Extended Supply Chain Andrew Moyad, CEO, Shared Assessments. John Bree, CRO, Supply Wisdom. Michelle Clement. Charles Forde, Nomura. Just as managing the risk of your direct suppliers is critical, understanding the risk of your suppliers' suppliers is imperative. While you may work ... 5 months ago | 63 mins Demo: Third Party Risk Management Maya Kano, Solutions Architect As you continue to engage with vendors, security ratings can illuminate vulnerabilities in your third- and fourth- party ecosystem. Learn About: - Bu... 3 months ago | 27 mins Confident Data gives you Actionable Insights in our Q4 '22 Release Gian Calvesbert, Madelyn Maletz, Vanessa Sorenson, Megann Freston, Miryam Meir A resilient and trusted digital ecosystem is impossible to achieve without an agile security program. How can you gain unparalleled visibility, quanti... 3 months ago | 60 mins A Tangled Web of Risk: The Challenges of Cyber Resiliency in Today’s Reality Megan DeBlois, Principal Product Manager; Tim Gallo, Strategic Intelligence Architect Subsidiaries, suppliers and third- or fourth-party vendors from all business relationships are increasingly being targeted as initial compromise vecto... 3 months ago | 44 mins Fireside chat with BitSight: A view from Infosecurity Europe on Security Ratings Richard Wall, Sales Director UKI, and Alfonso Hermosillo, Senior Consulting Engineer EMEA Infosecurity Europe came back strong this year in London as a face-to-face event, and BitSight wouldn't miss this opportunity to show once again the v... 7 months ago | 11 mins Align Internal Cybersecurity Practices with External Third-Party Risk Management Greg Rasner, Author | James Christiansen, VP and CSO, Netskope |Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity Cybersecurity risk continues to become more complex to manage. Today, it’s not enough to focus solely on the organization’s internal risk as control w... 1 year ago | 56 mins The State of Software Report 2022 Luc Brandts, Magiel Bruntink This year we released the fourth annual SIG Benchmark Report, a comprehensive look at the data & trends shaping the software industry, based on 70 bil... 2 months ago | 34 mins Load more