Cyber Security Ratings Are a Thing, What Do I Do Now?

Presented by

Josh Fazio, Senior Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, at SecurityScorecard

About this talk

As more and more companies connect together, it has never been more critical to understand the risk posed by third-party vendors. If their security posture isn’t up to your standards, it can create a backdoor into your systems that you have no control over. At the same time, companies can easily have hundreds or even thousands of connections with partners and vendors across the enterprise, making cyber security posture verification more than a full time job. How can companies solve this at scale and reduce the burden this creates on security teams? By using a ratings system. Security ratings provide risk management and security teams with critical information needed to make informed decisions on whether a vendor and their own security posture is sufficient to prevent cyber attacks and ensure information security. With this in mind, join SecurityScorecard’s Josh Fazio, Sr. Sales Engineer, and Miryam Meir, Senior Director of Product Marketing, as they dive into the topic of security ratings. This sponsored webinar will be moderated by Paul Holland, Principal Research Analyst at the ISF.

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (126)
Subscribers (20371)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user