Sunday, October 30, 2016

How CSOs can better manage third-party risks

A better way for security leaders to handle third party risk

Email not displaying correctly? View it in your browser.

CSO

CSO Continuity & Recovery

Oct 30, 2016
Featured Image
Video

How CSOs can better manage third-party risks

In the latest episode of Security Sessions, CSO Editor-in-Chief Joan Goodchild chats with Scott Schneider from CyberGRX, a startup in the third-party risk analysis space, about best practices and tips for CSOs when working on a risk analysis plan with third party vendors. Watch Now

Twitter Facebook LinkedIn

Your Must-Read Stories

A better way for security leaders to handle third party risk
Taking down the internet: possible but how probable?
Demo: Hacking a voting machine
Drones could help with disasters like Hurricane Matthew
Crisis planning: 6 ways to put people first

White Paper: Pure Storage

2016 Gartner Magic Quadrant Report for Solid-State Arrays

Gartner has done the research for you. Help your organization make an informed IT decision regarding flash storage. Read the 2016 Gartner Magic Quadrant for Solid-State Arrays to gain insights regarding the future state of the storage market and an independent vendor comparison. Also learn why Pure Storage achieved the furthest overall position for completeness of vision. Read More

Thumbnail Image

A better way for security leaders to handle third party risk

Patrick Gorman shares the change in mindset needed to improve how we handle and protect the digital supply chain, third-party risk, and security overall Read More

Thumbnail Image

Taking down the internet: possible but how probable?

Security guru Bruce Schneier reported recently that the companies that maintain the "backbone" of the internet have been under increasing attacks designed to test their defenses. It's the kind of thing, he said, that could mean an effort to take down the internet is in the works. Read More

Thumbnail Image
Video

Demo: Hacking a voting machine

Samir Kapuria from Symantec gives a demonstration about how someone could hack an electronic voting machine to provide extra votes for candidates. Watch Now

Thumbnail Image

Drones could help with disasters like Hurricane Matthew

Emergency personnel could use 'flying hot spots' to communicate in remote places where wireless antennas were lost or unavailable. Read More

Thumbnail Image
INSIDER

Crisis planning: 6 ways to put people first

"Planning for the 'what ifs' is not just about imagining events that are hard to imagine. It is about knowing which of your business functions will determine your ability to weather a crisis," says Bill Tibbo. Read More

Case Study: IBM Corporation

Case Study: Simplify, Save and Innovate

Learn how IBM helped a leading bank's IT organization focus on innovation and strategic projects while massively reducing costs and streamlining operations. Read More

Top 5 Stories

1. John McAfee: 'Iran hacked the DNC, and North Korea hacked DYN'
2. Amateurs were behind the Dyn Inc. DDoS attack, report says
3. Overweight, out of shape: Hack your body back
4. Chinese firm admits its hacked products were behind Friday's massive DDOS attack
5. Bots may be trumping online polls

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Continuity & Recovery as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2016 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.

ads

Ditulis Oleh : Angelisa Vivian Hari: 7:00 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive