Article Details
Scrape Timestamp (UTC): 2024-04-10 08:45:51.102
Source: https://www.theregister.com/2024/04/10/turning_the_tide_on_thirdparty/
Original Article Text
Click to Toggle View
Turning the tide on third-party risk. Using threat intelligence to mitigate against security breaches. Webinar There are some unhappy projections out there about the prevalence of third-party security breaches. These breaches occur when sensitive data is stolen from a third-party vendor or when their systems are used to access and steal sensitive information stored on your systems. Likely to be under-reported, it is thought that 29 percent of all incursions have come about through a third party for example. Your threat intelligence platform is likely in already in place and is very good at providing all kinds of detail about all kinds of attacks. But how hot is it on the risk from third-party partners and systems? Join our Regcast on 18 April at 3pm BST/10 am EDT/7am PDT to get more tips from Andy Grayland, CISO at Silobreaker on how threat intelligence can be used to minimize and manage potential third party risks to both your own and your partners' organizations. Identifying and mitigating third-party risk is often an area of high-level concern for security teams that need to consider what data to collect and how to correlate it with internal information sources. It's Silobreaker's business to provide real-time insights on emerging risks, so who better to offer advice? Sign up to watch the webinar here and we'll send you a reminder when it's time to log on. Sponsored by Silobreaker.
Daily Brief Summary
A significant 29% of security breaches are facilitated by third parties, either by data theft from vendors or using vendor systems to access sensitive information.
Breaches involving third-party vendors are likely under-reported, highlighting the critical need for robust third-party risk management.
Many organizations utilize threat intelligence platforms; however, the effectiveness of these tools in identifying and managing third-party risks can vary.
The webinar hosted by Silobreaker features CISO Andy Grayland discussing how to leverage threat intelligence to mitigate third-party security threats.
The discussion will focus on practical tips for security teams on data collection, risk correlation, and proactively managing third-party vulnerabilities.
Real-time insights on emerging third-party risks and their management will be provided, crucial for organizations looking to safeguard sensitive data against indirect exposure.
The event aims to equip attendees with enhanced strategies and tools for identifying and mitigating potential third-party risks impacting their operations.