Manage Third Party Risk Without A Questionnaire

Logo
Presented by

Tim Helming, DomainTools; Jonathan Kimmitt, U of Tulsa; Greg Dzurinda, Enviva; Brandon Dunlap, Moderator

About this talk

We’ve all seen third party risk programs that answer pre-defined questions that merely check a compliance box. Have you considered monitoring the real-world threats to your most trusted suppliers? Many companies monitor for threat actors spoofing their own internet assets, but can you identify when one of your key partners may be compromised? Valuable answers can be found in DNS data, as well as in the network traffic flowing across the internet. Join DomainTools and (ISC)² on September 22, 2022 at 1:00 p.m. Eastern / 10:00 a.m. Pacific as we discuss and dissect security incidents that occurred due to third party risk and identify how threat intelligence and threat hunting can expose the unknown risk to the critical points in your supply chain.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (190)
Subscribers (138187)
ISC2 hosts regular panel discussions on hot button infosecurity topics featuring thought leaders and visionaries from the industry who answer questions from the audience.