Cybersecurity and Third-Party Risk Third Party Threat Hunting

Afbeeldingen

Artikel vergelijken

  • Engels
  • Paperback
  • 9781119809555
  • 16 augustus 2021
  • 480 pagina's
Alle productspecificaties

Samenvatting

STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN

Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management.

In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization’s network by third parties. You’ll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.

The author discusses how to conduct due diligence on the third parties connected to your company’s networks and how to keep your information about them current and reliable. You’ll learn about the language you need to look for in a third-party data contract whether you’re offshoring or outsourcing data security arrangements.

Perfect for professionals and executives responsible for securing their organizations’ systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to:

  • Understand the fundamentals of third-party risk management
  • Conduct robust intake and ongoing due diligence
  • Perform on-site due diligence and close vendor risks
  • Secure your software supply chain
  • Utilize cloud and on-premises software securely
  • Continuously monitor your third-party vendors and prevent breaches


Move beyond the checklist and fully protect yourself from third-party cybersecurity risk

Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic.

The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing.

Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.

  • Understand the basics of third-party risk management
  • Conduct due diligence on third parties connected to your network
  • Keep your data and sensitive information current and reliable
  • Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts
  • Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax

The time to talk cybersecurity with your data partners is now.

Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.

Productspecificaties

Inhoud

Taal
en
Bindwijze
Paperback
Oorspronkelijke releasedatum
16 augustus 2021
Aantal pagina's
480

Betrokkenen

Hoofdauteur
Gregory C. Rasner
Hoofduitgeverij
John Wiley & Sons Inc

Overige kenmerken

Product breedte
152 mm
Product hoogte
25 mm
Product lengte
226 mm
Studieboek
Nee
Verpakking breedte
152 mm
Verpakking hoogte
25 mm
Verpakking lengte
226 mm
Verpakkingsgewicht
612 g

EAN

EAN
9781119809555

Je vindt dit artikel in

Boek, ebook of luisterboek?
Boek
Taal
Engels
Beschikbaarheid
Leverbaar
Studieboek of algemeen
Studieboeken
Nog geen reviews

Kies gewenste uitvoering

Prijsinformatie en bestellen

De prijs van dit product is 37 euro en 99 cent.
Uiterlijk 4 juni in huis
Verkoop door bol
  • Prijs inclusief verzendkosten, verstuurd door bol
  • Ophalen bij een bol afhaalpunt mogelijk
  • 30 dagen bedenktijd en gratis retourneren
  • Dag en nacht klantenservice