Third-Party Risk News, Articles and Updates

Stopping a 3rd party IT supplier data breach taking down a government

Government organisations responsible for highly sensitive information must ensure that if they are trusting a third-party IT supplier, they have a comprehensive privileged access management strategy in place says Csaba Krasznay

InfoSec 2016: How to manage huge risk of privileged insiders

In the drive to increase efficiency, organisations have outsourced many 'non-core' functions so how can they mitigate the information risks of using third-party IT suppliers?

Why CISOs must act now to lock down third party risk

Third parties are an ignored risk says Raimund Genes who advises, review your contracts and prioritise your third parties based on risk - for example, what kind of data can they access, for what purpose and in what volume?