Hi [[ session.user.profile.firstName ]]

Continuous Third Party Monitoring Powers Business Objectives

While many companies focus their effort on reducing cybersecurity risk, more threats are being discovered daily. Point-in-time, subjective questionnaires are not in line with the new regulations requiring continuous monitoring of vendors, partners and other third parties.

In “Continuous Third Party Monitoring Powers Business Objectives,” BitSight CTO and Co-founder Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy will discuss the value businesses are finding in using a solution that has a constant eye on third party cyber threats.

Boyer and Murphy will also discuss:

- The results of the study BitSight commissioned Forrester Consulting to undertake, examining how IT decision-makers feel about objective, reliable and continuous monitoring.
- What can be done beyond compliance to increase security performance.
- Which industries stand to benefit most from using automated, objective information security data.
- Specific use cases for continuous monitoring and how they help companies improve information security performance.
Recorded Sep 16 2015 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stephen Boyer, CTO & Co-Founder, BitSight Technologies; Featuring Renee Murphy, Senior Analyst, Forrester Research
Presentation preview: Continuous Third Party Monitoring Powers Business Objectives

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Assessing the Cyber Performance of the Financial Services Supply Chain Dec 20 2017 5:30 pm UTC 60 mins
    Tom Montroy, Data Scientist, BitSight; Noah Simon, Product Marketing Manager, BitSight
    An increasing number of data breaches begin with the compromise of a key vendor or business partner. This was evident with the spread of NotPetya ransomware this past June, which highlighted to the world the importance of updating systems within corporate networks to prevent susceptibility to breach. Now more than ever, it’s critical that organizations are aware of both the vulnerabilities within their own networks and those within their supply chain.

    Join Noah Simon (Product Marketing Manager, BitSight) and Tom Montroy (Data Scientist, BitSight) as they analyze BitSight’s findings on common security issues found within the supply chain of the Financial Services industry, and what any organization managing third-party risk needs to know. In this webinar, they will discuss:

    - The security performance of over 5,200 Legal, Technology, and Business Services companies monitored by hundreds of Financial Services firms on the BitSight Security Rating platform.

    - BitSight’s research on botnet infections, outdated systems, and peer-to-peer file sharing within the Financial Services industry.

    - Best practices for managing third-party cyber risk and analyzing weak links in your supply chain.
  • Lessons Learned in 2017: Reflecting on the Year's Security Trends Recorded: Dec 12 2017 41 mins
    Dan Dahlberg, Data Scientist, BitSight
    From WannaCry to NotPetya, 2017 demonstrated an increase in the sophistication of cyber attacks occurring worldwide. As these incidents become more frequent and target more prominent organizations, is your business adequately prepared in your cyber risk strategy moving into 2018? Join BitSight Data Scientist Dan Dahlberg as he discusses:

    - BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks.

    - Cybersecurity trends shown throughout the year, and their implications on the nature of the incidents we can expect in 2018.

    - Recommendations for creating a strong security strategy that proactively mitigates risk within your organization and across your supply chain in 2018.
  • BitSight Data Recorded: Dec 4 2017 2 mins
    BitSight
    Learn more about the breadth and quality of BItSight's data.
  • Benchmarking Security Performance With BitSight Security Ratings Recorded: Nov 27 2017 39 mins
    Stephen Boyer, CTO, BitSight
    Benchmarking has been a cornerstone of business for years. By benchmarking different functions of business, from HR to customer service and finance, businesses can compare performance against their industry and peers. So why not benchmark a company’s IT security performance?

    Watch this video featuring BitSight CTO Stephen Boyer to learn how businesses can leverage the data provided by Security Ratings to effectively benchmark security performance against an industry or peer organizations.
  • BitSight's Portfolio Quality Dashboard for Vendor Risk Management Recorded: Nov 27 2017 3 mins
    BitSight
    How do you and your third parties perform? BitSight's Portfolio Quality Dashboard can tell you.
  • BitSight Discover Recorded: Nov 27 2017 3 mins
    BitSight
    Learn more about the BitSight Discover product.
  • Vendor Risk Management Performance: Key Reporting Metrics for Executives Recorded: Nov 15 2017 55 mins
    Rebecca Ruiz (Southern California Edison), Tom Stumpek (Former CIO & CISO, General Electric), Joel Alcon (BitSight)
    Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.

    Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

    Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

    Join this interactive webcam panel webinar to learn more about:
    - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
    - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
    - Proactive ways to mitigate third party risk.
  • Improving the Maturity of Your Vendor Risk Management Program Recorded: Oct 31 2017 27 mins
    Erinmichelle Perri, CISO, Multiplan; Joel Alcon, Product Marketing Manager, BitSight
    As the complexity of cyber attacks grows, healthcare organizations are keenly aware of the sensitive data that is at the heart of their businesses. Healthcare companies must remain vigilant about their security posture as well as the security of their third and fourth party vendors, especially as patient data continues to migrate to digital systems.

    In this webinar, Erinmichelle Perri, CISO of MultiPlan, and Joel Alcon, Product Marketing Manager at BitSight will discuss:

    - The biggest security challenges facing the healthcare industry today and proactive ways these organizations can mitigate cyber risk.

    - How MultiPlan effectively reports on their security and vendor risk management programs to their Board of Directors using security ratings.

    - How MultiPlan has established a scalable vendor risk management strategy that fosters collaboration between MultiPlan and its trusted vendors.
  • Are You Ready for GDPR? Preparing Your Organisational Checklist Recorded: Oct 19 2017 61 mins
    Julian Parkin, Metro Bank; Philip East, BitSight
    Introduced in 2016, the General Data Protection Regulation (2016/679)—or GDPR—was created for the purpose of strengthening the European Union’s (EU) procedures and practices related to data protection. GDPR will impact organisations worldwide and implement maximum fines of up to €20,000,000 (or 4% of global turnover) if they fail to ensure compliance. Join BitSight’s Philip East and Metro Bank’s Julian Parkin as they discuss:

    - The checklist organisations should review to align their business with GDPR.
    - Noteworthy articles within GDPR and how they affect data governance/usage.
    - BitSight’s recommendations for monitoring the GDPR alignment of third parties.
  • What Are BitSight Security Ratings? Recorded: Oct 5 2017 2 mins
    BitSight
    Learn more about the BitSight Security Ratings product.
  • A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems Recorded: Sep 27 2017 41 mins
    Dan Dahlberg, Data Scientist, BitSight
    This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures.

    Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:

    - BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks
    - The risk of running outdated systems on your business’ bottom line
    - The risks organizations face if companies in their supply chain are not keeping up with their patching process
  • Lessons from the Trenches: 6 Years of Continuous Monitoring Recorded: Sep 14 2017 47 mins
    Jake Olcott, VP of Strategic Partnerships, BitSight
    Join Jake Olcott, VP of Strategic Partnerships at BitSight, as he discusses best practices and lessons learned from top risk leaders and organizations, along with unique data and insight into recent events like WannaCry. This webinar will cover:

    - The evolution of vendor risk management and the increasing importance of investment in cybersecurity programs to monitor and mitigate emerging threats.

    - A breakdown of the Fortune 1000’s security performance according to BitSight researchers.

    - BitSight’s recent research on data breaches, especially the correlation between ransomware attacks like WannaCry and outdated systems.

    - The value of continuous monitoring with security ratings throughout the vendor lifecycle.
  • The Evolution of Executive Reporting Recorded: Aug 30 2017 55 mins
    Rebecca Ruiz (Southern California Edison), Tom Stumpek (Former CIO & CISO, General Electric), Joel Alcon (BitSight)
    Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management (VRM) strategies.

    Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

    Join us as Rebecca Ruiz (Principal Advisor, IT Cybersecurity & Compliance, Southern California Edison), Tom Stumpek (former CISO and CIO, General Electric), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

    Join this interactive webcam panel webinar to learn more about:
    - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.
    - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.
    - Proactive ways to mitigate third party risk.
  • Catching the Blind Spots of Vendor Risk Management Recorded: Aug 15 2017 26 mins
    Joel Alcon, BitSight
    In today’s day and age, organizations understand that data breaches are a growing problem, but many fail to realize that a third party breach can impact them as much as a breach on their own network. In this webinar, BitSight’s Joel Alcon will discuss:

    -Several misconceptions surrounding vendor risk management (VRM)

    -The role both the Board of Directors and Regulators are playing in third party security practices

    -How organizations can proactively create a strategy to avoid common pitfalls
  • Secrets of the Superstar CISO Recorded: Jul 27 2017 59 mins
    Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest)
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • Impact of NotPetya & Top Recommendations for Defending Against the Next Big One Recorded: Jul 13 2017 62 mins
    Greg Bell (Corelight), Stephen Boyer (BitSight), Michael Landewe (Avanan), Brian Robison (Cylance)
    In the aftermath of the recent NotPetya/ExPetr cyber attack that spread across Europe, Asia and the US in June, what are the lessons for enterprises and organizations? How should we improve our critical data security in an age of high-frequency and high-impact cyber attacks?

    Join this interactive Q&A panel session with security experts from Cylance, Corelight and BitSight as they discuss:
    - Trends in cyber attacks: NotPetya / Wannacry
    - The short-term and long-term impact
    - Tips for organizations on how to improve their security posture
    - Steps to take today and insights to guide your long-term security strategy

    Speakers:
    - Greg Bell, CEO of Corelight
    - Stephen Boyer, CTO & Co-founder of BitSight
    - Michael Landewe, Co-Founder of Avanan Cloud Security

    Moderator:
    - Brian Robison, Sr. Director of Technical Marketing, Cylance
  • A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems Recorded: Jul 12 2017 40 mins
    Dan Dahlberg, BitSight
    This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures. Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:

    -BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks

    -The risk of running outdated systems on your business’ bottom line

    -The risks organizations face if companies in their supply chain are not keeping up with their patching process
  • Ransomware & Other Cybersecurity Trends In Major Industries Recorded: May 31 2017 36 mins
    Jay Jacobs, Joel Alcon: BitSight
    Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Reputation Matters: Keeping Your Brand Strong in the Age of Cyber Risk Recorded: May 23 2017 61 mins
    Jake Olcott, VP of Business Development, BitSight; Siobhan Gorman, Brunswick Group; John Fiore, Former CIO, BNY Mellon
    In today's world, a cybersecurity incident can quickly become a risk to an organization's reputation. Reputational risk management is a critical business practice to ensure that your organization is doing everything possible to minimize the potential damage to its character or value.

    Join our panelists Jake Olcott, VP of Business Development at BitSight, Siobhan Gorman, Director at Brunswick Group, and John Fiore, Former CIO of BNY Mellon as they discuss:

    - How to mitigate reputational risk through cybersecurity risk management
    - Ways in which reputational risk can affect your company's bottom line
    - What executive leaders and board members care most about in regard to reputational risk
    - Examples of successful and unsuccessful reputational risk management
    - How security officials should be thinking about reputational risk management in their data security initiatives
  • Are Common Business Partners Putting You At Risk? Recorded: Apr 18 2017 28 mins
    Jay Jacobs, Senior Data Scientist, BitSight Technologies
    BitSight researchers recently studied the security performance of Fortune 1000 companies alongside a random sample of companies with a similar industry breakdown. How did they compare, and what should organizations take away from the study?

    Join Jay Jacobs, Senior Data Scientist at BitSight to learn about the security strengths and weaknesses found within Fortune 1000 companies. In this webinar, you’ll learn:

    - How the security hygiene of Fortune 1000 companies compare to similar counterparts
    - Why Fortune 1000 companies disclose nearly twice the amount of data breaches as other companies
    - Common machine comprises found in Fortune 1000 companies
    - What all businesses can take away as a result

    Register today and get a copy of the report upon attending the webinar!
Find Out How Security Ratings can Reduce Your Company's Risk.
The BitSight Security Rating Platform gathers terabytes of data on daily security outcomes from hundreds of sensors deployed across the globe.

All of the data is externally available and collected without any intrusive testing. Data is classified into several risk categories, including botnets, spam, malware, unsolicited communication, DDoS, and system configuration, and then mapped to an organization's known networks.

BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence to create an overall rating of that organization’s security performance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Continuous Third Party Monitoring Powers Business Objectives
  • Live at: Sep 16 2015 5:00 pm
  • Presented by: Stephen Boyer, CTO & Co-Founder, BitSight Technologies; Featuring Renee Murphy, Senior Analyst, Forrester Research
  • From:
Your email has been sent.
or close