ThirdPartyTrust Blog

Jeffrey Spetter

Find me on:

Recent Posts

Data is the new oil and breaches are the new spills; so where is the leak?

Posted by Jeffrey Spetter on 7/6/18 9:11 AM

The former CEO of Intel, Brian Kzranich said last month, “Data, I look at it as the new oil. It’s going to change most industries across the board. Oil changed the world in the 1900s. It drove cars, it drove the whole chemical industry,” Krzanich explains.

Read More

Topics: Vendor Risk Management

The Real Challenges of Moving Cyber Initiatives Forward

Posted by Jeffrey Spetter on 5/29/18 9:45 AM

With growing executive demand for changes to cybersecurity processes and awareness comes inherent challenges to an organization. To set the stage, the NotPetya attacks on Moeller-Maersk shipping company took them offline for ten days. Jim Haggemann Snabe, the Chairman, describes the heroic efforts to get 45,000 PCs and 2,500 servers back and up and running (see video) proves that ransomware attacks or never before seen attacks can have tremendous impact on business operations.

Read More

Topics: Regulation, IoT Security, Vendor Risk Management, third party risk

Guest Blog by Todd Tressler - Tick tock: a GDPR Primer to meet the deadline next week

Posted by Jeffrey Spetter on 5/23/18 2:52 PM

Discussions on privacy laws have taken front and center in recent weeks as European Union (EU) member states begin enforcing the General Data Protection Regulation (“GDPR”) on May 25, 2018.  As we have been discussing for a while, there is confusion as data collectors try to figure out the impact of this legislation.  There is no question that large, multi-national corporations will have to comply and many of these corporations are already in compliance.  However, with this deadline just around the corner, smaller companies that do not actively target EU residents are struggling with how this legislation impacts them.

Read More

Topics: third party risk, GDPR

How is Cyber Shaping the Insurance Industry? Learn From Pros at Allstate, Trustmark and BCSF.

Posted by Jeffrey Spetter on 4/23/18 3:28 PM

Anders Norremo, CEO of ThirdPartyTrust, had the pleasure of moderating a panel at the OnRamp Insurance Conference on Thursday April 12th, 2018.  The panelist included Mia Boom-Ibes, Fawaz Rasheed, Steve Timmerman, and Tammy Kocher. They all gave great insight to how cybersecurity is shaping the insurance industry. 

We will explore questions surrounding the New York Department of Financial Services Cyber Regulation, next-generation technologies and the biggest needs from these organizations. 

Read More

Topics: Regulation, third party risk, Panel Discussions

Guest Blog by Mike Baier on GDPR and the Integration of Third Party Service Providers

Posted by Jeffrey Spetter on 4/5/18 4:13 PM

While the entire world is seemingly melting with the terrifying onslaught of the enforcement of the General Data Protection Regulation (GDPR…coming to a theater near you on May 25th, 2018) there remains a significant amount of mis-information, confusion, and utter chaos within some of the world’s largest corporations (HQ’d outside of the EU) and on social media regarding the continued use of trusted third parties in support of business operations…especially, those companies not too experienced with heavily regulated environments such as banking, insurance, and other financial services.

Read More

Topics: third party risk, GDPR

TPT InfoSec Interviews: Rocio Baeza, CEO Cybersecuritybase

Posted by Jeffrey Spetter on 3/27/18 12:39 PM

Hi, everyone. This is Jeff Spetter from ThirdPartyTrust and I had the great pleasure of speaking with Rocio Baeza, CEO of CyberSecurityBase. Here's a recap and audio of the interview. 

Read More

Topics: Vendor Risk Management

Experts Share Important Metrics for Assessing Vendor risk

Posted by Jeffrey Spetter on 1/10/18 4:43 PM

Metrics drive the measure of progress and stand as benchmarks during any assessment, audit or review process. They are the life blood of reporting and when it comes to vendor risk management, it is not as straight forward as you might think. Let's take a deeper look into what Guy Dulberger of Ritchie Bros. has to say about the key metrics to track when assessing vendor risk and how a risk-based approach is the new norm for vendor risk management. 

 "I think an important aspect of what makes a great security report, KPI or metric is understanding your business and where your greatest orgnizational risk lies."

- Guy Dulberger, Information Security Executive

Read More

Topics: Best Practices

Data Risk in the Third-Party | Ponemon Institute

Posted by Jeffrey Spetter on 10/12/17 8:29 AM

The Ponemon Institute recently rolled out there second annual study of Data Risk in the Third-Party Ecosystem. The study aims to understand trends in the challenges companies face in protecting sensitive and confidential information shared with third parties and 4th party vendors. 

Read More

Topics: Vendor Risk Management, third party risk

7 Risks to Data In the Third Party Eco-system

Posted by Jeffrey Spetter on 8/21/17 8:30 AM

The Ponemon Institute conducted a study back in April of 2016 surveying companies to understand the challenges they face in protecting sensitive and confidential information shared with third parties resulting in Data Risk in the Third-Party Ecosystem study.

Read More

Topics: Regulation, Vendor Risk Management, Best Practices

Who will be in charge of IoT security? 

Posted by Jeffrey Spetter on 6/19/17 10:29 AM

The internet of things has huge promise in the upcoming years to improve efficiencies in decade old industries and provide insight for predictive analytics software companies to help shape the way people interact with the physical environment. Gartner projects the hype of total connected devices to be as high as 20.4B globally by 2020 and reaching a total spend on hardware close to $3 trillion. 


Read More

Topics: IoT Security

ThirdPartyTrust is a vendor risk management platform strengthening cyber risk intelligence and simplifying the management process for enterprises performing vendor risk assessments.
By analyzing both third and fourth party vendor cyber risk using a network-based solution, like 3PT, trust is built and mapped within your vendor eco-system.

Subscribe to Email Updates

Recent Posts