We’ve all seen third party risk programs that answer pre-defined questions that merely check a compliance box. Have you considered monitoring the real-world threats to your most trusted suppliers? Many companies monitor for threat actors spoofing their own internet assets, but can you identify when one of your key partners may be compromised? Valuable answers can be found in DNS data, as well as in the network traffic flowing across the internet.
Join DomainTools and (ISC)² on September 22, 2022 at 1:00 p.m. Eastern / 10:00 a.m. Pacific as we discuss and dissect security incidents that occurred due to third party risk and identify how threat intelligence and threat hunting can expose the unknown risk to the critical points in your supply chain.