Cybersecurity and Third-Party Risk
eBook - ePub

Cybersecurity and Third-Party Risk

Third Party Threat Hunting

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Cybersecurity and Third-Party Risk

Third Party Threat Hunting

About this book

Move beyond the checklist and fully protect yourself from third-party cybersecurity risk

Over the last decade, there have been hundreds of big-name organizations in every sector that have experienced a public breach due to a vendor. While the media tends to focus on high-profile breaches like those that hit Target in 2013 and Equifax in 2017, 2020 has ushered in a huge wave of cybersecurity attacks, a near 800% increase in cyberattack activity as millions of workers shifted to working remotely in the wake of a global pandemic.

The 2020 SolarWinds supply-chain attack illustrates that lasting impact of this dramatic increase in cyberattacks. Using a technique known as Advanced Persistent Threat (APT), a sophisticated hacker leveraged APT to steal information from multiple organizations from Microsoft to the Department of Homeland Security not by attacking targets directly, but by attacking a trusted partner or vendor. In addition to exposing third-party risk vulnerabilities for other hackers to exploit, the damage from this one attack alone will continue for years, and there are no signs that cyber breaches are slowing.

Cybersecurity and Third-Party Risk delivers proven, active, and predictive risk reduction strategies and tactics designed to keep you and your organization safe. Cybersecurity and IT expert and author Gregory Rasner shows you how to transform third-party risk from an exercise in checklist completion to a proactive and effective process of risk mitigation.

  • Understand the basics of third-party risk management
  • Conduct due diligence on third parties connected to your network
  • Keep your data and sensitive information current and reliable
  • Incorporate third-party data requirements for offshoring, fourth-party hosting, and data security arrangements into your vendor contracts
  • Learn valuable lessons from devasting breaches suffered by other companies like Home Depot, GM, and Equifax

The time to talk cybersecurity with your data partners is now.

Cybersecurity and Third-Party Risk is a must-read resource for business leaders and security professionals looking for a practical roadmap to avoiding the massive reputational and financial losses that come with third-party security breaches.

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Cybersecurity and Third-Party Risk by Gregory C. Rasner in PDF and/or ePUB format, as well as other popular books in Computer Science & Insurance. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Wiley
Year
2021
Print ISBN
9781119809555
eBook ISBN
9781119809562

Table of contents

  1. Cover
  2. Table of Contents
  3. Title Page
  4. Introduction
  5. Chapter 1: What Is the Risk?
  6. Chapter 2: Cybersecurity Basics
  7. Chapter 3: What the COVID‐19 Pandemic Did to Cybersecurity and Third‐Party Risk
  8. Chapter 4: Third‐Party Risk Management
  9. Chapter 5: Onboarding Due Diligence
  10. Chapter 6: Ongoing Due Diligence
  11. Chapter 7: On‐site Due Diligence
  12. Chapter 8: Continuous Monitoring
  13. Chapter 9: Offboarding
  14. Chapter 10: Securing the Cloud
  15. Chapter 11: Cybersecurity and Legal Protections
  16. Chapter 12: Software Due Diligence
  17. Chapter 13: Network Due Diligence
  18. Chapter 14: Offshore Third‐Party Cybersecurity Risk
  19. Chapter 15: Transform to Predictive
  20. Chapter 16: Conclusion
  21. Index
  22. Copyright
  23. Dedication
  24. (ISC)2ÂŽ
  25. About the Author
  26. About the Technical Editor
  27. Acknowledgments
  28. Foreword
  29. End User License Agreement