10 Essential Steps to NYDFS Compliance
Help us build a quality automation solution for our web application and the cybersecurity engine that drives it.
Own our production clusters on GKE. Get involved in scaling, monitoring and cloud architecture. Improve our Jenkins setup but also guide us in Cir...
Supply chain attacks are on the rise, resulting in high financial impact for organizations. Learn the key processes, skills and technologies to prevent them.
Security professionals are responsible for safeguarding company data and assets, but often lack adequate visibility. Learn how to unveil your supply chain’s attack surface.
The security management of your SaaS and cloud providers is an essential element of a company’s cybersecurity strategy. Learn how to accomplish this.
Learn how to upgrade your third-party security program by scaling it effectively, continuously monitoring suppliers and ensuring that the program becomes the company-wide standard throughout the relationship lifecycle.
Learn how to scale an actionable third-party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture.
Many organizations are struggling to keep up with an onslaught of significant regulations like GDPR, CCPA, the New York Shield Act and more. Some of this legislation appears to overlap, while some seems to be contradictory. How can organizations sort out this tangled regulatory web?
Your third-party security program involves 3 stakeholders: the business owner, you as the representative of the security and risk team and the vendor itself. Each party has its own needs, which introduces friction into an already complex process. You can eliminate that friction. By adding context to the relationship, you can align parties on business goals, communicate risk in a language everyone will understand and more easily mitigate that risk.
In today’s dynamic cyber world, third-party security is necessary, but can be challenging to implement. Learn how a leading investment firm succeeded in creating a robust and efficient third-party security process.
There is no shortage of data to consume, but who has the expertise and bandwidth to keep on top of this veritable flood of information? The answer for many organizations may be in truly understanding the inherent risk of every relationship, and tying residual risk ratings dynamically to events revealed by monitoring tools and other data we gather.