The Ponemon Institute recently rolled out there second annual study of Data Risk in the Third-Party Ecosystem. The study aims to understand trends in the challenges companies face in protecting sensitive and confidential information shared with third parties and 4th party vendors.
On September 6th, 2017, Anders Norremo, CEO of ThirdPartyTrust, moderated a panel of manufacturing experts on the topic of CyberSecurity & Manufacturing in the Digital Era at the OnRamp Conference in Milwaukee, WI.
Panelists included Chris Merkel, CISO of Brunswick Corp; David McPhee, the Regional Information Security Manager at Caterpillar; Michael Goetzman, CISO at Master Lock; and Steve Brukbacher, the Application Security Manager at Johnson Controls.
Topics: Vendor Risk Management
The Ponemon Institute conducted a study back in April of 2016 surveying companies to understand the challenges they face in protecting sensitive and confidential information shared with third parties resulting in Data Risk in the Third-Party Ecosystem study.
Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey, 63% of all data breaches stem from vendor related attacks. IT experts predict that number of vendor related attacks will rise, as companies increasingly resort to outsourcing for innovation and expanded services.
Topics: Vendor Risk Management
At the Morningstar Security Summit on June 26th, 2017, Morningstar's CIO and team gathered industry experts to discuss best practices in cyber security and risk assessment. Sessions throughout the day included: State of the Security Industry, Understanding Emerging Threats and Regulatory Trends, Amazon Web Services Security, Protecting What Matters and a panel discussion on "Should You Trust Your Third Party Vendors?."
On June 11th, Currency hosted the Changing Landscape of Cybersecurity Regulation event, in order for a set of experts to discuss the nature and implications surrounding New York’s recent financial regulations along with its possible push to national regulation.
The attacks of 2016 & 2017 revealed the scope of cyber warfare is limitless, that no individual, no organization and no region is impenetrable. Over these past two years, hackers have targeted a diverse array of institutions. The National Security Agency, the Federal Bureau of Investigation, and the presidential campaigns in both the United States and in France are a few of many organizations to have experienced data breaches.
Over the past year, cyberattacks have infiltrated hundreds of thousands of security systems, devastating government and infrastructure in more than 150 countries—including Spain’s telecommunications, Britain’s hospital system and Germany’s railways. Organization’s in the private sector aren’t left unscathed, as several Fortune 500 companies have experienced data breaches as well, such as FedEx and Nissan. Following the series of high profile attacks, organizations have become increasingly conscious of their own vulnerabilities.
Topics: Data Breaches
The internet of things has huge promise in the upcoming years to improve efficiencies in decade old industries and provide insight for predictive analytics software companies to help shape the way people interact with the physical environment. Gartner projects the hype of total connected devices to be as high as 20.4B globally by 2020 and reaching a total spend on hardware close to $3 trillion.
Topics: IoT Security
According to SmallBizTrends cyber security report earlier this year, 60% of businesses will go out of business within 6 months of a cyber attack. Not because they can’t operationally keep the essentials of the business going, but more so because of the hefty costs associated with a breach.
Topics: Cyber Tools