Jason Steer, Recorded Future; David Klein, ProcessUnity; Alastair Parr, Prevalent; and Alex Valdivia, ThreatConnect
Data breaches are one of the world’s biggest cybersecurity threats for organizations of all sizes. A recent survey conducted by the Ponemon Institute revealed that 59% of organizations have experienced one or more data breaches caused by a third party, costing an average of $7.5 million to remediate. Incorporating current threat intelligence is critical to building and maintaining an effective third-party risk program.
A successful third-party risk program should provide comprehensive threat intelligence to empower teams to understand, and take action against potential risks by monitoring for key indicators, including data leakage, incident reports, domain abuse, email security, vulnerable infrastructure, web application security, dark web attention and breach intelligence. Join this expert panel discussion to learn how to determine the risk of third parties by applying threat intelligence, including how to:
- Understand inherent risk and how that risk impacts our third party’s security
- Assess third parties to identify, prioritize, and mitigate gaps in their security control implementation
- Map out hacker workflows (kill chains) for identified attack scenarios
- Continuously monitor and update everything in relationship to the current threat landscape