Hi [[ session.user.profile.firstName ]]

Vendor Risk Management Scenarios That Haunt You

Whether you are in the beginning stages of implementing a vendor risk management (VRM) program, or you have a robust program, there are always scenarios that can blindside your organization. Compounding this uncertainty is the dynamic environment of cyber risk. Yet, there are tools and techniques organizations can leverage in order to reduce uncertainty about the security of their third parties and vendors.

Join Matt Cherian, Director of Products at BitSight as he discusses how to grapple with common vendor risk scenarios. In this webinar, viewers will learn:

- How to gain full visibility into the security of your critical third parties to avoid being caught off guard
- How to understand and communicate potential threats occurring on the networks of your third parties
- What to do when an infection- or breach occurs
Recorded Oct 27 2016 32 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Matt Cherian
Presentation preview: Vendor Risk Management Scenarios That Haunt You

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Lessons from the Trenches: 6 Years of Continuous Monitoring Sep 14 2017 5:00 pm UTC 45 mins
    Jake Olcott, VP of Strategic Partnerships, BitSight
    Join Jake Olcott, VP of Strategic Partnerships at BitSight, as he discusses best practices and lessons learned from top risk leaders and organizations, along with unique data and insight into recent events like WannaCry. This webinar will cover:

    - The evolution of vendor risk management and the increasing importance of investment in cybersecurity programs to monitor and mitigate emerging threats.

    - A breakdown of the Fortune 1000’s security performance according to BitSight researchers.

    - BitSight’s recent research on data breaches, especially the correlation between ransomware attacks like WannaCry and outdated systems.

    - The value of continuous monitoring with security ratings throughout the vendor lifecycle.
  • The Evolution of Executive Reporting Aug 30 2017 3:30 pm UTC 60 mins
    Rebecca Ruiz, Southern California Edison; Tom Stumpek, Former CIO & CISO; Joel Alcon, BitSight
    Organizations continue to outsource critical operations to third parties. As a result of this trend, security ratings are quickly becoming a key component of effective vendor risk management strategies. Although Boards of Directors and senior executives are interested in their organization’s security posture, information security and risk management teams often lack the necessary information to help them understand details and clearly communicate about the aggregate risk of their vendor ecosystem.

    Join us as Rebecca Ruiz (Principal Advisor of IT Cybersecurity & Compliance and Risk, Southern California Edison), Tom Stumpek (former CISO and CIO, Electric Insurance Company), and Joel Alcon (Product Marketing Manager, BitSight) discuss best practices for reporting metrics to senior executives around vendor risk management performance.

    This webinar will cover:

    - Southern California Edison’s methods of effectively reporting their vendor risk management program performance to their cybersecurity oversight group.

    - An executive perspective on the “do’s and don’ts” of successfully presenting your organization’s security posture through metrics and beyond.

    - Proactive ways to mitigate third party risk.
  • Catching the Blind Spots of Vendor Risk Management Aug 15 2017 3:00 pm UTC 60 mins
    Joel Alcon, BitSight
    In today’s day and age, organizations understand that data breaches are a growing problem, but many fail to realize that a third party breach can impact them as much as a breach on their own network. In this webinar, BitSight’s Joel Alcon will discuss:

    -Several misconceptions surrounding vendor risk management (VRM)

    -The role both the Board of Directors and Regulators are playing in third party security practices

    -How organizations can proactively create a strategy to avoid common pitfalls
  • Healthcare Meets Vendor Care: Improving The Maturity of Your VRM Program Aug 8 2017 3:00 pm UTC 30 mins
    Erinmichelle Perri, CISO, MultPlan; Joel Alcon, Product Marketing Manager, BitSight
    As the complexity of cyber attacks grows, healthcare organizations are keenly aware of the sensitive data that is at the heart of their businesses. Healthcare companies must remain vigilant about their security posture as well as the security of their third and fourth party vendors, especially as patient data continues to migrate to digital systems.

    In this webinar, Erinmichelle Perri, CISO of MultiPlan, and Joel Alcon, Product Marketing Manager at BitSight will discuss:

    - The biggest security challenges facing the healthcare industry today and proactive ways these organizations can mitigate cyber risk.

    - How MultiPlan effectively reports on their security and vendor risk management programs to their Board of Directors using security ratings.

    - How MultiPlan has established a scalable vendor risk management strategy that fosters collaboration between MultiPlan and its trusted vendors.
  • Secrets of the Superstar CISO Jul 27 2017 3:00 pm UTC 60 mins
    Jake Olcott, VP of Strategic Partnerships, BitSight; Chris McClean, Vice President, Research Director, Forrester (Guest)
    As business success grows more reliant on data, technology, and third parties, CISOs and security leaders are finding themselves more often in the spotlight. They're being asked to brief board members, respond to third party requests, guide critical decisions, and make tough strategic calls. These increasing expectations are creating great opportunities for CISOs to shine, but to do so, they need to rise to the occasion. This webinar takes best practices and lessons learned from "superstar" CISOs, explaining what top security leaders are doing to lead their companies successfully through some of today's most complex business and technology challenges.
  • Impact of NotPetya & Top Recommendations for Defending Against the Next Big One Recorded: Jul 13 2017 62 mins
    Greg Bell (Corelight), Stephen Boyer (BitSight), Michael Landewe (Avanan), Brian Robison (Cylance)
    In the aftermath of the recent NotPetya/ExPetr cyber attack that spread across Europe, Asia and the US in June, what are the lessons for enterprises and organizations? How should we improve our critical data security in an age of high-frequency and high-impact cyber attacks?

    Join this interactive Q&A panel session with security experts from Cylance, Corelight and BitSight as they discuss:
    - Trends in cyber attacks: NotPetya / Wannacry
    - The short-term and long-term impact
    - Tips for organizations on how to improve their security posture
    - Steps to take today and insights to guide your long-term security strategy

    Speakers:
    - Greg Bell, CEO of Corelight
    - Stephen Boyer, CTO & Co-founder of BitSight
    - Michael Landewe, Co-Founder of Avanan Cloud Security

    Moderator:
    - Brian Robison, Sr. Director of Technical Marketing, Cylance
  • A Growing Risk Ignored: Exploring the Risks & Pitfalls of Outdated Systems Recorded: Jul 12 2017 40 mins
    Dan Dahlberg, BitSight
    This past May, over 300,000 computers in over 150 countries were affected by the WannaCry ransomware attacks. Despite an available patch from Microsoft, many of the companies failed to install critical updates prior to the attack-- leaving them vulnerable. Thousands of machines were infected and the worm caused network outages, flight cancellations, and ATM failures. Given the increasing number of endpoint devices connected to corporate networks, the ever- expanding supply chain, and the complexity of cyber attacks, are companies adequately updating their operating systems? In this webinar, BitSight Data Scientist Dan Dahlberg will discuss:

    -BitSight’s own research on outdated endpoints and their correlation to the May 2017 WannaCry attacks

    -The risk of running outdated systems on your business’ bottom line

    -The risks organizations face if companies in their supply chain are not keeping up with their patching process
  • Ransomware & Other Cybersecurity Trends In Major Industries Recorded: May 31 2017 36 mins
    Jay Jacobs, Joel Alcon: BitSight
    Large-scale data breaches continue to hit all industries, leading to millions of compromised records. According to the Identity Theft Resource Center, there were 780 data breaches in which nearly 178 million records were compromised. While no industry is immune to data breaches, some are more prepared than others.

    Join Jay Jacobs, Senior Data Scientist at BitSight as he explains how security posture differs in six major industries. This webinar will highlight new findings on:

    - The most common ransomware infections
    - The rate of ransomware infections found across major industries
    - The aggregate BitSight Security Rating for each industry
  • Reputation Matters: Keeping Your Brand Strong in the Age of Cyber Risk Recorded: May 23 2017 61 mins
    Jake Olcott, VP of Business Development, BitSight; Siobhan Gorman, Brunswick Group; John Fiore, Former CIO, BNY Mellon
    In today's world, a cybersecurity incident can quickly become a risk to an organization's reputation. Reputational risk management is a critical business practice to ensure that your organization is doing everything possible to minimize the potential damage to its character or value.

    Join our panelists Jake Olcott, VP of Business Development at BitSight, Siobhan Gorman, Director at Brunswick Group, and John Fiore, Former CIO of BNY Mellon as they discuss:

    - How to mitigate reputational risk through cybersecurity risk management
    - Ways in which reputational risk can affect your company's bottom line
    - What executive leaders and board members care most about in regard to reputational risk
    - Examples of successful and unsuccessful reputational risk management
    - How security officials should be thinking about reputational risk management in their data security initiatives
  • Are Common Business Partners Putting You At Risk? Recorded: Apr 18 2017 28 mins
    Jay Jacobs, Senior Data Scientist, BitSight Technologies
    BitSight researchers recently studied the security performance of Fortune 1000 companies alongside a random sample of companies with a similar industry breakdown. How did they compare, and what should organizations take away from the study?

    Join Jay Jacobs, Senior Data Scientist at BitSight to learn about the security strengths and weaknesses found within Fortune 1000 companies. In this webinar, you’ll learn:

    - How the security hygiene of Fortune 1000 companies compare to similar counterparts
    - Why Fortune 1000 companies disclose nearly twice the amount of data breaches as other companies
    - Common machine comprises found in Fortune 1000 companies
    - What all businesses can take away as a result

    Register today and get a copy of the report upon attending the webinar!
  • How to Approach Portfolio Risk Aggregation Recorded: Mar 29 2017 38 mins
    Samit Shah
    Join us on Wednesday, March 29th has Samit Shah, BitSight's Insurance Solutions Manager discusses how cyber insurers should approach portfolio risk aggregation and how other businesses can use this mindset to decrease risk across their portfolio of vendors.
  • 3 Ways to Improve Your Security Performance This Year Recorded: Mar 9 2017 24 mins
    Julia Grunewald, Senior Customer Success Manager, BitSight Technologies
    With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies use security ratings to help measure and mitigate cyber risk across their business ecosystems.

    Join this talk to learn how you can improve your organization’s security rating by improving your overall security posture.

    In this webinar, you’ll learn:

    - Three ways to improve your security performance in 2017
    - What impact these changes could have on your Security Rating
    - How to use BitSight Security Ratings to prioritize the remediation of security events and issues
  • How to Mitigate Cyber Risk with Efficient Vendor Risk Management Recorded: Feb 22 2017 42 mins
    Kevin Roden and Julia Grunewald
    Over the past few years, outsourcing business functions to vendors has been on the rise. In fact, there are more third-party relationships today than ever before. However, as the number of supplier relationships grows, so grows the amount of risk those suppliers pose. And in today’s hyper-connected landscape, cyber risk has taken center stage when it comes to vendor risk.

    Join former CIO, Kevin Roden, and BitSight’s Senior Customer Success Manager, Julia Grunewald, on Wednesday, February 22nd at 1pm ET, as they discuss traditional and emerging vendor risk management (VRM) tactics.

    In this webinar you’ll learn:
    - How VRM has traditionally been handled
    - Why traditional strategies alone aren’t enough
    - Advice on how to effectively and efficiently mitigate cyber risk
  • A CIO's Guide to Benchmarking Cybersecurity Performance Recorded: Feb 9 2017 61 mins
    Jake Olcott, VP of Business Development, BitSight, Tom Stumpek, Technology Advisor and former CIO of GE
    In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

    Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

    - Why cybersecurity benchmarking is difficult for the modern CIO
    - Different methods of benchmarking you may be involved in (or want to consider)
    - How Security Ratings may solve many benchmarking challenges
  • Presenting Cybersecurity to the Board: Your How-to for Success Recorded: Jan 25 2017 62 mins
    Richard Clarke, Jasper Osstenjuk, Jake Olcott
    Today, cybersecurity is a #1 concern for board members. But what do they need to know? And how should it be presented?

    Richard Clarke has a pretty good idea. As a senior White House advisor to four U.S. Presidents, a member of three corporate boards, and CEO of Good Harbor Security Risk Management, he’s talked cybersecurity in both the Situation Room and the boardroom.

    Jasper Ossentjuk also knows how to present cybersecurity in the boardroom. As SVP and CISO for TransUnion, Jasper regularly presents information to his Board about his organization's security posture.

    On January 25th at 1:00PM ET, join Richard and Jasper for a discussion of:

    - What cybersecurity metrics and measurements are most important for the board
    - Methods for security leaders to communicate security issues across the enterprise
    - How to graphically represent your cybersecurity program
  • Exploring the Current State of Cybersecurity in the Legal Sector Recorded: Jan 19 2017 45 mins
    Jake Olcott, VP of Business Development at BitSight Technologies and Jay Jacobs, Sr. Data Scientist at BitSight Technologies
    Despite the fact that third party breaches have been on the rise, organizations may not be doing enough to manage the cybersecurity of all of their critical vendors. Law firms, in particular, are one of the most widely used third parties, yet the Legal sector may be getting overlooked in vendor security discussions.

    In fact, the latest BitSight Insights Industry Index report revealed that although companies in the Legal sector have high security ratings and low rates of vulnerabilities, the industry remains a key target for cyber criminals. Therefore, it’s crucial for organizations in this space to understand their cybersecurity posture and improve their vendor risk management techniques.

    Join Jake Olcott, VP at BitSight, and Jay Jacobs, Sr. Data Scientist at BitSight as they discuss data security in the Legal sector and beyond. In this webinar, you’ll learn:

    - How the cybersecurity posture of the Legal sector has changed over time
    - How the Legal sector stacks up against six other industries
    - The importance of cybersecurity in the Legal sector
  • 3 Tips to Improve your Security Posture in 2017 Recorded: Dec 21 2016 23 mins
    Julia Grunewald, Senior Customer Success Manager at BitSight Technologies
    With new cyber attacks and data breaches emerging on a daily basis, today’s organizations need a deeper understanding of the security performance of their programs, policies, and third parties. That’s why many companies are now using BitSight Security Ratings to help measure and mitigate cyber risk across their business ecosystems.

    On Wednesday December 21st at 12pm ET, join BitSight Technologies’ Senior Customer Success Manager, Julia Grunewald, as she discusses how you can improve your organization’s security rating by improving your overall security posture.

    In this webinar, you’ll learn:
    - Three ways to improve your security performance
    - What impact these changes could have on your Security Rating
    - How to use BitSight Security Ratings to prioritize the remediation of security events and issues
  • The Data Disconnect: Why Not All Security Ratings are Created Equal Recorded: Dec 20 2016 61 mins
    Stephen Boyer, CTO and Co-founder of BitSight, Dave Shackleford, Voodoo Security and SANS
    From time-consuming audits to expensive penetration tests, evaluating a company’s security posture can seem like a daunting task. However, today’s organizations are increasingly adopting Security Rating Services (SRS) as a means to quantify and monitor their own cyber risk, as well as the risk of their third party vendors.

    So, how should you go about using security ratings? What’s the real difference between different rating services? And how does that impact your business?

    Join BitSight Technologies’ CTO and Co-founder, Stephen Boyer, and Dave Shackleford of SANS as they discuss the importance of curating high-quality data for security ratings and explore why verifiable data should be at the heart of any security rating solution.

    In this webinar, you’ll learn:
    - The key components of highly-actionable security ratings
    - How those components impact your cyber risk
    - Why data quality is so important
    - What the difference between subpar and superior security ratings could mean for your business
  • Cybersecurity Benchmarking For CIOs Recorded: Nov 29 2016 60 mins
    Jake Olcott, Tom Stumpek
    In order for a business to be competitive, it must be continuously improving. This is something the modern chief information officer (CIO) knows all too well. Further, technological advances and greater outsourcing in business have made cyber risk a key area that requires a great deal of thought from the CIO. So, how can CIOs know how their security programs are performing in order to make decisions on allocating funding, headcount, and policies?

    Join Jake Olcott. VP of Business Development at BitSight and Tom Stumpek, a Technology Advisor and former CIO for GE. Attendees will learn:

    - Why cybersecurity benchmarking is difficult for the modern CIO.
    - Different methods of benchmarking you may be involved in (or want to consider).
    - How Security Ratings may solve many benchmarking challenges.
  • Bridging the Gap on Data Breaches: What Makes the Difference? Recorded: Nov 23 2016 57 mins
    Jay Jacobs, Dave Bradford
    Every organization wants to know how to best protect their systems and data – but exactly where to focus efforts and resources can be daunting. Compromised machines, outdated software, certificate mismanagement, and faulty encryption practices can all increase the risk that an organization will experience a breach, but is there one single area on which businesses should concentrate?

    In this webinar, Jay Jacobs, Senior Data Scientist at BitSight discusses new research on common characteristics exhibited by organizations that have suffered data breaches. Dave Bradford, Chief Strategy Officer and Director of Strategic Partnership Development at Advisen will discuss how this research is relevant for carriers and providers of cyber insurance.
Find Out How Security Ratings can Reduce Your Company's Risk.
The BitSight Security Rating Platform gathers terabytes of data on daily security outcomes from hundreds of sensors deployed across the globe.

All of the data is externally available and collected without any intrusive testing. Data is classified into several risk categories, including botnets, spam, malware, unsolicited communication, DDoS, and system configuration, and then mapped to an organization's known networks.

BitSight’s sophisticated algorithms analyze the data for severity, frequency, duration, and confidence to create an overall rating of that organization’s security performance.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Vendor Risk Management Scenarios That Haunt You
  • Live at: Oct 27 2016 5:30 pm
  • Presented by: Matt Cherian
  • From:
Your email has been sent.
or close