ISE® Fireside Webinar

Please complete this form to begin viewing: "ISE® FIRESIDE WEBINAR: What Am I Trying to Protect? Prioritizing Third-Party Risk Management"

Original broadcast: September 22, 2021
Duration: 45 minutes

Sponsored by:

Qualys

Moderator:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists:

Bill Abrams

Bill Abrams
Chief Information Security Officer
Eastman Kodak Company

Ben Carr

Ben Carr
Chief Information Security Officer
Qualys

Supply chain attacks and ransomware affecting critical infrastructure have proliferated in news reports lately. While there is no silver bullet to stop all risks, many protections against them are those we already have in place, centered around cybersecurity hygiene and fundamentals. However, the supply chain is truly a chain, meaning you have to ensure not only your enterprise’s security but also your supplier’s and everyone else’s downstream in the chain. Many organizations have a “Trust but Verify” security model that dwindles to just “Trust” the farther down the chain they go. While we can audit third-party suppliers, it becomes unfeasible to do so with fourth and fifth parties. However, we are seeing more attackers pivot to extort not only the primary victim of a third-party data breach but also the victim’s customers and partners. Join our conversation as we discuss how to conduct third-party risk management without going down an endless rabbit hole as well as how to investigate attacks effectively, so that the cybersecurity community can learn from your findings.

* Required fields