Appropriate Software Security Control Types for Third Party Service and Product Providers

Third party software is the new perimeter for every financial institution.According to Gartner, “since enterprises are getting better at defending perimeters, attackers are targeting IT supply chains.”3 Further, recent breach reports such as Verizon’s Data Breach Investigations Report underscore the vulnerability of the application layer, including third party software. This new perimeter of third party software must be addressed. Fortunately, the majority of financial services firms and many technology vendors are investing in improving software security control practices within the lifecycle of software development to provide products and capabilities that are more resilient to attack. Pushing innovation in the marketplace while protecting information assets exposed in emerging technologies (like mobile computing or cloud services) is a continual challenge and dilemma for financial services firms. The financial services industry has historically provided leadership in the development of effective vendor management practices to reduce the risk of exposure of customer and employee information. Financial institutions have led the implementation of effective governance models for third parties providing IT products and services for over a decade. Many IT vendors have incorporated prudent risk management controls into their product development processes as a result.

Spotlight

ManTech International Corporation

ManTech is a leading provider of innovative technologies and solutions for mission-critical national security programs for the intelligence community; the Departments of Defense, State, Homeland Security, Energy and Justice, including the Federal Bureau of Investigation (FBI); the health and space communities; and other U.S. federal government customers. We provide support to critical national security programs for approximately 50 federal agencies through approximately 1,000 current contracts. ManTech's expertise includes cyber security; command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) solutions and services; information technology (IT) modernization and sustainment; intelligence/counter-intelligence solutions and support; systems engineering; healthcare analytics and IT; global logistics support; test and evaluation; and environmental, range, and sustainability services. ManTech supports major national missions, such as military read

OTHER WHITEPAPERS
news image

Network Traffic Analysis (NTA): A Cybersecurity ‘Quick Win’

whitePaper | February 27, 2020

According to research from ESG and the Information Systems Security Association (ISSA), 91% of cybersecurity professionals believe that most organizations are either extremely or somewhat vulnerable to a significant cyber-attack or data breach.1 This level of cyber-risk demands immediate attention and action from CISOs, CIOs, and business executives. As a result, 62% of organizations plan to increase cybersecurity spending in 2020.2 Here’s the problem: Increasing security budgets alone isn’t enough. CISOs need quick and easy wins that can greatly bolster security efficacy and streamline operations without demanding massive projects and vast resources. There is a lot of work ahead. This white paper concludes.

Read More
news image

Dispatcher Phoenix Security

whitePaper | December 16, 2022

The advancement of technology has transformed the MFP into a key element of a company’s document infrastructure and workflow; however, as the role of the MFP has changed, the risk of security breaches has increased as well. Ensuring document confidentiality, allowing for system authentication, and providing clear audit trails are now necessities in every document-intensive industry. The objective of this white paper is to describe how Konica Minolta’s Dispatcher Phoenix software application helps organizations comply with their security requirements.

Read More
news image

CloudVision as-a-Service: Security and Data Protection

whitePaper | January 24, 2023

Cloud-based software delivery has increasingly become the norm in today’s world, owing to the elasticity, scalability, and economy of cloud architectures. Arista has established a leadership position in the delivery of reliable and secure cloud networking and services management through the introduction of CloudVision®, a single unified AI/ML-enabled network management platform supporting every place in the cloud – and CloudVision is now available in an “as-aService” delivery model in the cloud.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Security Whitepaper

whitePaper | October 5, 2022

AutodeskConstruction Cloud®is a cloud-baseddesign andconstruction project management platformdesigned to improve performance across a project’s lifecycle. As a secure,cloud-based platform, Autodesk Construction Cloudoffers the benefits of collaboration in the design and construction spacewhile safeguarding customer data. Autodesk Construction Cloudis designed and built using best-in-class cloud software practices and powered by Amazon Web Services (AWS), the world’s leader in cloud infrastructure. We havedesigned our services to be scalable and secure, thus providing our customers with a resilient and safeapplication. We know our customers’business is relying on us and we take that responsibility seriously.DocumentPurposeand ScopeThe purpose of this document is to outline Autodesk Construction Cloudoperations, software development,and security measures implemented in theenvironment.WHAT IS INCLUDED:The scope of this whitepaper includes all modules and services in AutodeskDocs, Autodesk Build(including PlanGridBuild), Autodesk Takeoff, Autodesk BIM Collaborate and Autodesk BIM Collaborate Pro (including Revit®Cloud Worksharing, Collaboration for Civil 3D®, and Collaboration for Plant 3D®).WHAT IS EXCLUDED:The scope of this whitepaper excludesthe following: Assemble, BuildingConnected, Pype,ACCConnect,BIM 360 Field, BIM 360 Glue, BIM 360 Plan, BIM 360 Ops, and BIM 360 Team. For more information on security practices for Autodesk products, visit theAutodesk Trust Center.

Read More
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More

Spotlight

ManTech International Corporation

ManTech is a leading provider of innovative technologies and solutions for mission-critical national security programs for the intelligence community; the Departments of Defense, State, Homeland Security, Energy and Justice, including the Federal Bureau of Investigation (FBI); the health and space communities; and other U.S. federal government customers. We provide support to critical national security programs for approximately 50 federal agencies through approximately 1,000 current contracts. ManTech's expertise includes cyber security; command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) solutions and services; information technology (IT) modernization and sustainment; intelligence/counter-intelligence solutions and support; systems engineering; healthcare analytics and IT; global logistics support; test and evaluation; and environmental, range, and sustainability services. ManTech supports major national missions, such as military read

Events