"How Secure Are Your Business Service Providers?"

"Over the years, businesses have outsourced key business functions and supply chains have grown, increasing risks in the process. When assessing risk for third parties, many companies may immediately think of their banks, their IT service providers, or their software manufacturers. However, there are many overlooked segments of the business services industry that could pose significant risks.

Join Mike Woodward, Program Director of Data at BitSight as he discusses:

– how Accounting, Benefits, Law Firms, and PR Firms differ in security performance
– how quickly these sub-sectors remediate infection on their networks
– how continuous monitoring of vendors can help mitigate the risk of service providers "
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

Adopting a proactive approach to security with Extended Security Posture Management (XSPM)

Don’t miss Omdia’s expert cybersecurity analysts as they discuss Extended Security Posture Management (XSPM), a new proactive approach destined to help organizations reevaluate security programs and investments, asses the effectiveness of their end-to-end security, and how to get the data needed to make better decisions on risk management.
Watch Now

5 steps every charity should take to improve their cyber security

NCSC

On Thursday 7th March at 1pm we'll be collaborating with NCSC for a second time to explore the 5 steps every charity should take to improve their cyber security. The first webinar of this series focused on the threats charities face from cyber attacks and the effect this could have on their organisation. In this session, we’ll look at the simple, free or low cost steps every charity should be taking to protect themselves online.
Watch Now

Winning the Zero Trust Race with Micro-Segmentation

GuardiCore

In the modern, hyper-connected and threat-laden enterprise landscape, organizations face increasing pressure to protect their systems and data. Originally conceived in 2010, the zero trust security concept has recently gained new ground and is now seen as a vital element of enterprise information security. It is a model that aids user and device verification, strengthens authentication processes and ensures encryption. However, zero trust is not without its challenges, and mastering the art of zero trust takes strategic management and forethought.
Watch Now

Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy

Malicious attacks on mobile applications are on the rise, presenting significant security and privacy risk to consumer data. Each data storage touchpoint is an additional attack surface. With CCPA data privacy regulations kicking in this year, companies need to be more aware of what data they keep and where it’s stored. Maintaining a zero-trust mentality and incorporating security by design is essential for keeping your mobile environment secure.
Watch Now