,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,

ThirdPartyTrust Blog

7 Risks to Data In the Third Party Eco-system

Posted by Jeffrey Spetter on 8/21/17 8:30 AM

The Ponemon Institute conducted a study back in April of 2016 surveying companies to understand the challenges they face in protecting sensitive and confidential information shared with third parties resulting in Data Risk in the Third-Party Ecosystem study.

Read More

Topics: Regulation, Vendor Risk Management, Best Practices

Morningstar & Uptake Discuss Vendor Risk Management Best Practices with Anders Norremo

Posted by Olivia Mandell on 7/31/17 8:55 AM

Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey, 63% of all data breaches stem from vendor related attacks. IT experts predict that number of vendor related attacks will rise, as companies increasingly resort to outsourcing for innovation and expanded services.

Read More

Topics: Vendor Risk Management

At Morningstar Security Summit, Experts Discuss Vendor Risk Management

Posted by Olivia Mandell on 7/27/17 8:00 AM

      At the Morningstar Security Summit on June 26th, 2017, Morningstar's CIO and team gathered industry experts to discuss best practices in cyber security and risk assessment. Sessions throughout the day included: State of the Security Industry, Understanding Emerging Threats and Regulatory Trends, Amazon Web Services Security, Protecting What Matters and a panel discussion on "Should You Trust Your Third Party Vendors?."

Read More

Topics: Partnerships, Vendor Risk Management

Event Recap: Panelists Discuss NY DFS Cybersecurity Regulation

Posted by Olivia Mandell on 7/21/17 8:20 AM

         On June 11th, Currency hosted the Changing Landscape of Cybersecurity Regulation event, in order for a set of experts to discuss the nature and implications surrounding New York’s recent financial regulations along with its possible push to national regulation. 

Read More

Topics: Partnerships, Data Breaches

Vendor Risk and the Regulatory Response

Posted by Olivia Mandell on 7/18/17 11:38 AM

            The attacks of 2016 & 2017 revealed the scope of cyber warfare is limitless, that no individual, no organization and no region is impenetrable. Over these past two years, hackers have targeted a diverse array of institutions. The National Security Agency, the Federal Bureau of Investigation, and the presidential campaigns in both the United States and in France are a few of many organizations to have experienced data breaches.

Read More

Topics: Regulation, Data Breaches, Vendor Risk Management

CAMP IT Data Breach Discussion: Impact on Security/Risk Strategy

Posted by Olivia Mandell on 6/28/17 10:07 AM

                 Over the past year, cyberattacks have infiltrated hundreds of thousands of security systems, devastating government and infrastructure in more than 150 countries—including Spain’s telecommunications, Britain’s hospital system and Germany’s railways. Organization’s in the private sector aren’t left unscathed, as several Fortune 500 companies have experienced data breaches as well, such as FedEx and Nissan. Following the series of high profile attacks, organizations have become increasingly conscious of their own vulnerabilities.

Read More

Topics: Data Breaches

Who will be in charge of IoT security? 

Posted by Jeffrey Spetter on 6/19/17 10:29 AM

The internet of things has huge promise in the upcoming years to improve efficiencies in decade old industries and provide insight for predictive analytics software companies to help shape the way people interact with the physical environment. Gartner projects the hype of total connected devices to be as high as 20.4B globally by 2020 and reaching a total spend on hardware close to $3 trillion. 

 

Read More

Topics: IoT Security

Essential Security Software for Businesses

Posted by Jeffrey Spetter on 6/5/17 8:00 AM

According to SmallBizTrends cyber security report earlier this year, 60% of businesses will go out of business within 6 months of a cyber attack. Not because they can’t operationally keep the essentials of the business going, but more so because of the hefty costs associated with a breach.

Read More

Topics: Cyber Tools

BITS SIG & PDF Reports Available on ThirdPartyTrust

Posted by Anders Norremo on 6/2/17 9:45 AM
Here is a rundown of the latest features ThirdPartyTrust has added to the platform given customer feedback and market trends. 
The list includes: 
BITS SIG full questionnaire online with quantifiable risk scoring
Custom labels making sorting and managing vendors easier
Vendor PDF reports for the board meetings and auditors
Read More

Topics: Cyber Tools

The White House's Cyber Policy Impact on the Digital Supply Chain

Posted by Jeffrey Spetter on 5/19/17 11:30 AM

       If you missed it, President Donald Trump signed an Executive Order to implement improved cybersecurity practices at the federal level including networks, critical infastructure and the Nation. The cyber community has mostly been pleased with the outlined plan to bolster the nations security posture and focus on protecting against cyber attacks.

Read More

Topics: Regulation