Effective Steps to Reduce Third-Party Risk

  • Date 06 Jun 2019

Effective Steps to Reduce Third-Party Risk

06 Jun 2019, 11:15 - 11:45

Talking Tactics
Language:
English

As organisations struggle to protect themselves from the seemingly ubiquitous threat of cyberattack, the concept of risk management becomes all the more important. Compounding this issue for security executives and professionals is the dramatic increase in connectivity, brought about in part by the pressure for greater productivity and efficiency through digitisation and the utilisation of various third-party applications and services.

Organisations now have hundreds of connections to third parties including vendors, customers, cloud environments, outsourced service providers, and more, each representing additional attack vectors and risk. This session will feature fundamental, high-level strategies to consider for a third-party risk mitigation plan as well as an overview of technologies and architectures to reduce third-party risk.

Learning Outcomes:

  1. Learn about the risks presented by third-party connections
  2. Learn about the variety of third-party attacks that have taken place
  3. Learn about useful technologies and architectures from real-life use cases
  4. Learn third-party risk mitigation strategies
  5. Take away a high-level risk mitigation plan

 

Contributors

  • Scott Coleman

    Speaker

    Director of Marketing & Product Management

    Owl Cyber Defense

    Scott joined the Owl team in 2014, bringing with him a strong technical background with 25+ years of experience working for high tech, B2B companies...

Business Issues covered

  1. What will this session help you to do?
    • Balance, manage and prioritise risk‎
    • Understand internal and external threats and keep a business secure‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

Sponsors

Owl Cyber Defense

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.