ThirdPartyTrust Blog

Data Risk in the Third-Party | Ponemon Institute

Posted by Jeffrey Spetter on 10/12/17 8:29 AM

The Ponemon Institute recently rolled out there second annual study of Data Risk in the Third-Party Ecosystem. The study aims to understand trends in the challenges companies face in protecting sensitive and confidential information shared with third parties and 4th party vendors. 

Read More

Topics: Vendor Risk Management, third party risk

Panel: Cybersecurity & Manufacturing in the digital era

Posted by Yasmeen Ghazal on 9/11/17 4:20 PM

On September 6th, 2017, Anders Norremo, CEO of ThirdPartyTrust, moderated a panel of manufacturing experts on the topic of CyberSecurity & Manufacturing in the Digital Era at the OnRamp Conference in Milwaukee, WI.

Panelists included Chris Merkel, CISO of Brunswick Corp; David McPhee, the Regional Information Security Manager at Caterpillar; Michael Goetzman, CISO at Master Lock; and Steve Brukbacher, the Application Security Manager at Johnson Controls. 

Read More

Topics: Vendor Risk Management

7 Risks to Data In the Third Party Eco-system

Posted by Jeffrey Spetter on 8/21/17 8:30 AM

The Ponemon Institute conducted a study back in April of 2016 surveying companies to understand the challenges they face in protecting sensitive and confidential information shared with third parties resulting in Data Risk in the Third-Party Ecosystem study.

Read More

Topics: Regulation, Vendor Risk Management, Best Practices

Morningstar & Uptake Discuss Vendor Risk Management Best Practices with Anders Norremo

Posted by Olivia Mandell on 7/31/17 8:55 AM

Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey, 63% of all data breaches stem from vendor related attacks. IT experts predict that number of vendor related attacks will rise, as companies increasingly resort to outsourcing for innovation and expanded services.

Read More

Topics: Vendor Risk Management

At Morningstar Security Summit, Experts Discuss Vendor Risk Management

Posted by Olivia Mandell on 7/27/17 8:00 AM

      At the Morningstar Security Summit on June 26th, 2017, Morningstar's CIO and team gathered industry experts to discuss best practices in cyber security and risk assessment. Sessions throughout the day included: State of the Security Industry, Understanding Emerging Threats and Regulatory Trends, Amazon Web Services Security, Protecting What Matters and a panel discussion on "Should You Trust Your Third Party Vendors?."

Read More

Topics: Partnerships, Vendor Risk Management

Event Recap: Panelists Discuss NY DFS Cybersecurity Regulation

Posted by Olivia Mandell on 7/21/17 8:20 AM

         On June 11th, Currency hosted the Changing Landscape of Cybersecurity Regulation event, in order for a set of experts to discuss the nature and implications surrounding New York’s recent financial regulations along with its possible push to national regulation. 

Read More

Topics: Partnerships, Data Breaches

Vendor Risk and the Regulatory Response

Posted by Olivia Mandell on 7/18/17 11:38 AM

            The attacks of 2016 & 2017 revealed the scope of cyber warfare is limitless, that no individual, no organization and no region is impenetrable. Over these past two years, hackers have targeted a diverse array of institutions. The National Security Agency, the Federal Bureau of Investigation, and the presidential campaigns in both the United States and in France are a few of many organizations to have experienced data breaches.

Read More

Topics: Regulation, Data Breaches, Vendor Risk Management

CAMP IT Data Breach Discussion: Impact on Security/Risk Strategy

Posted by Olivia Mandell on 6/28/17 10:07 AM

                 Over the past year, cyberattacks have infiltrated hundreds of thousands of security systems, devastating government and infrastructure in more than 150 countries—including Spain’s telecommunications, Britain’s hospital system and Germany’s railways. Organization’s in the private sector aren’t left unscathed, as several Fortune 500 companies have experienced data breaches as well, such as FedEx and Nissan. Following the series of high profile attacks, organizations have become increasingly conscious of their own vulnerabilities.

Read More

Topics: Data Breaches

Who will be in charge of IoT security? 

Posted by Jeffrey Spetter on 6/19/17 10:29 AM

The internet of things has huge promise in the upcoming years to improve efficiencies in decade old industries and provide insight for predictive analytics software companies to help shape the way people interact with the physical environment. Gartner projects the hype of total connected devices to be as high as 20.4B globally by 2020 and reaching a total spend on hardware close to $3 trillion. 


Read More

Topics: IoT Security

Essential Security Software for Businesses

Posted by Jeffrey Spetter on 6/5/17 8:00 AM

According to SmallBizTrends cyber security report earlier this year, 60% of businesses will go out of business within 6 months of a cyber attack. Not because they can’t operationally keep the essentials of the business going, but more so because of the hefty costs associated with a breach.

Read More

Topics: Cyber Tools