In part 2 of his series on the cybersecurity risks in compliance, Michael Volkov addresses how companies can manage cyber with their third-party vendors. “Over half of all cyber-attacks are the direct or indirect result of third party access,” Volkov writes. “Given this fact of corporate life, companies have to manage these risks by ensuring third-party access to sensitive data is restricted to only that which is needed to provide a specific service. Third-party due diligence for cyber risks has to focus on some weighty issues.”
Cybersecurity, Privacy, & AI
Trending Now
Agriculture Department Kicks Off $300M Palantir Deal on IT, National Security Work • Vercel Attack Fallout Expands to More Customers and Third-Party Systems • Seeing the Cyber in Economic Statecraft • Responding to a Data Breach: How to Preserve the Attorney-Client Privilege • NIST Cyber Center to Launch OT ‘Visibility’ Project
Managing Third-Party Vendor Cybersecurity Risks (Part II of III)
Alexander Supertramp | Shutterstock
Stay compliant and protected with daily updates on cybersecurity, data privacy, and federal oversight with our Cyber & Privacy newsletter, delivering up-to-the-minute intelligence Monday–Saturday — Subscribe here.
