Fortifying Your Attack Surface: How to Defend Against Third-Party Risks

Logo
Presented by

Colin Whittaker with Tim Mullen, OneTrust; Rachael Olsen, LogicGate; Andrew Snell, Prevalent; and Neal Roylance, RiskRecon

About this talk

Today, most security and IT teams are dealing with an attack surface that is exponentially larger than it used to be, and many organizations lack full visibility into their entire asset landscape. Networks often include hundreds or thousands of networking devices, security products, IoT devices, and connected OT systems; and businesses are relying more and more on third-party code and apps to get their work done. On this webinar we will explore actionable strategies for reducing your attack surface and defending against third-party risks, and attendees will gain insights on: - The different types of attack surfaces, including digital, social engineering, and physical. - Common attack vectors utilized by threat actors, such as vulnerable web components, phishing emails, weak credentials, malware, and misconfiguration exploits. - Innovative approaches to attack surface reduction, including meticulous inventory management, access restriction, network segmentation, and comprehensive employee cybersecurity training. - Effective strategies to combat threats and mitigate third-party risks.
Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (69)
Subscribers (49792)
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.