Applying Threat Intelligence to Improve Visibility into Third-Party Risks

Logo
Presented by

Jason Steer, Recorded Future; David Klein, ProcessUnity; Alastair Parr, Prevalent; and Alex Valdivia, ThreatConnect

About this talk

Data breaches are one of the world’s biggest cybersecurity threats for organizations of all sizes. A recent survey conducted by the Ponemon Institute revealed that 59% of organizations have experienced one or more data breaches caused by a third party, costing an average of $7.5 million to remediate. Incorporating current threat intelligence is critical to building and maintaining an effective third-party risk program. A successful third-party risk program should provide comprehensive threat intelligence to empower teams to understand, and take action against potential risks by monitoring for key indicators, including data leakage, incident reports, domain abuse, email security, vulnerable infrastructure, web application security, dark web attention and breach intelligence. Join this expert panel discussion to learn how to determine the risk of third parties by applying threat intelligence, including how to: - Understand inherent risk and how that risk impacts our third party’s security - Assess third parties to identify, prioritize, and mitigate gaps in their security control implementation - Map out hacker workflows (kill chains) for identified attack scenarios - Continuously monitor and update everything in relationship to the current threat landscape
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (68)
Subscribers (49534)
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.