The upcoming enforcement of GDPR puts the spotlight on data governance, but what about the potential impact on vendor risk management? How do you prepare for this new generation of cybersecurity regulations?
Download this eBook that discusses:
Common threads in GDPR, NIST framework and other guidance
Greatest...
Third party risk management is imperative today for organizations large and small. Senior executives and Boards of Directors are increasingly asking for updates into their vendor risk management programs and looking for demonstrable progress in reducing third party cyber risk.
While Finance organizations tend to...
Despite a staggering rise in the exposures faced by global businesses from cyber attack, data theft or privacy violations, the insurance industry remains well capitalized and willing to supply substantial cover to organizations in the form of cyber insurance.
Download this whitepaper to learn about the unique...
As the GDPR enforcement date edges closer, organizations remain unprepared to comply - especially when it comes to vendor risk management. What - beyond contracts - do organizations need?
Download this whitepaper that discusses:
Why organizations remain unprepared for GDPR
What is most misunderstood about vendor...
There are many reasons why healthcare companies are far more concerned about the security posture of their vendors”and the maturity of their vendor risk management (VRM) program”than ever before. Medical data and personal patient information is migrating to the digital world, cyber attacks are continuing to grow in...
A recent study rates the cybersecurity performance of Fortune 1000 enterprises. Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, there really isn't a decrease in the number of reported incidents.
Download this whitepaper to...
When it comes to breach preparation, it isn't just about protecting IT assets. Increasingly, the conversation is about reputational risk management, says Jacob Olcott of BitSight Technologies.
In an interview about reputational risk management, Olcott discusses:
The intersection of cybersecurity with...
Between the three industry-standard security assessment methodologies, there are literally thousands of questions that you could use when assessing vendor security. But what are the essential, high-level and critical questions you should be asking your vendors?
Download this whitepaper and learn:
40 questions you...
BitSight Technologies has just concluded a new study that rates the cybersecurity performance of Fortune 1000 enterprises. What are the key takeaways? Data Scientist Jay Jacobs shares his analysis.
One significant point: Despite the rash of high-profile breaches and the reality that organizations are dedicating...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.