The Round the Clock Third Party Advantage

Presented by

Brandon Dobrec, LookingGlass Cyber Solutions and Paul Roberts, Security Ledger

About this talk

Vendors, suppliers, and independent subsidiaries are gaining more and more access to your network and sensitive data because today’s business models include outsourcing of non-mission critical programs and tasks, which brings a whole new world of risk to your organization. These not so new cyber risks make traditional perimeter defense no longer enough. Companies need continuous visibility and monitoring of their external partners threat landscapes. Use a cyber situational awareness platform that provides you with a map of your cyber risks you can identify vulnerabilities before the adversary does. In this webinar, LookingGlass Product Manager, Brandon Dobrec and Security Ledger Editor-in-Chief, Paul Roberts will discuss what you need to assess vendors in the modern cyber environment, providing you with the right map to assess your external risk. This webinar will answer: - Why point-in-time scorecards are a necessary component of third party risk management, but are woefully inadequate for proactively defending against future attacks - How a cyber situational platform delivers an outside-in view of your network, allowing you to see gaps in your network - Tools, capabilities, features, and functionalities are needed to assess vendor risk – continuous monitoring, alerting, reporting, and dynamic collection & scoring, among others - Common attack vectors, why these vectors remain open, and what attack vectors are emerging regularly

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (37)
Subscribers (6466)
LookingGlass Cyber Solutions delivers comprehensive threat intelligence driven security through a scalable solution portfolio of machine readable threat intelligence (MRTI), threat intelligence management with 140+ data sources transformed into global Internet and threat intelligence, threat intelligence services, and network threat mitigation. By addressing risks across structured Indicators of Compromise (IoCs), unstructured and open source data (OSINT), internal network telemetry, and network threat mitigation, customers gain unprecedented understanding into threats that may impact their business including cyber, physical assets, and third party partners. Prioritized, relevant and timely insights enable customers to operationalize threat intelligence in an effective and efficient way throughout the threat lifecycle.