Leading Indicators That Your Vendors May Be Compromised

Logo
Presented by

Tony Howlett, SecureLink's Previous CISO

About this talk

Vetting vendors and other third parties that access your network and systems are considered best practices for information security these days. In fact, it is required under many regulations such as GDPR, CCPA, NYS-DFS, and most compliance frameworks. And for good reason, more and more breaches are being perpetrated through third-party connections. But how can you know if a vendor either has already been breached or may have the conditions present in their systems for an imminent breach? Download this webinar to: - Examine some leading indicators that a vendor could be the source of a future breach. - Give actionable recommendations and best practices that will help you control and limit the possible damage these vendors could cause to your organization’s security.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (62)
Subscribers (1789)
Over the past two decades, we have become the leading experts in critical access management for highly regulated enterprise organizations, technology vendors, healthcare providers, and more. Organizations of varying industries and needs continue to depend on SecureLink to secure access to their critical systems, data, IT and OT infrastructure, regulated information, and networks. Our value is more than world-class products — it’s our partnerships with every organization we work with. We understand technology, security, industries, and the vast cyber threats our customers face. We’re here to stand beside them and keep them secure.