Third Party Threat Hunting™

Third Party Threat Hunting™Third Party Threat Hunting™Third Party Threat Hunting™

Third Party Threat Hunting™

Third Party Threat Hunting™Third Party Threat Hunting™Third Party Threat Hunting™
  • Home
  • Services/Products
  • The Book
  • Upcoming Events
  • Blog
  • More
    • Home
    • Services/Products
    • The Book
    • Upcoming Events
    • Blog
  • Sign In
  • Create Account

  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services/Products
  • The Book
  • Upcoming Events
  • Blog

Account


  • Orders
  • My Account
  • Sign out


  • Sign In
  • Orders
  • My Account

Third-Party threat hunting

Third-Party threat hunting Third-Party threat hunting Third-Party threat hunting

REDUCING YOUR CYBER RISK FOR YOUR VENDORS

Third-Party threat hunting

Third-Party threat hunting Third-Party threat hunting Third-Party threat hunting

REDUCING YOUR CYBER RISK FOR YOUR VENDORS

About Third Party Threat hunting

Cybersecurity Third-Party Risk is a top CISO concern

Third-Party Risk, and in particular, the Cybersecurity domain are often listed as one of the top 3 concerns when CISOs are queried.  Third-Party Threat Hunting builds off the lessons and success of the top-reviewed, first-book in this space: "Cybersecurity & Third-Party Risk", by Gregory Rasner and published in July 2021 by Wiley Publishing.  Our experts can provide a range of services to get your program started, matured or optimized based upon your needs.  We can provide an expert to speak at an event on a particular topic in this domain or train your sales staff so they can help create the demand.  SolarWinds, Hafnium, Log4J, and dozens of other risks, vulnerabilities and breaches are adding to the risk visibility for Boards, Shareholders and others.  This team can help with a program or a team selling services as an MSP to secure their customers.  We look forward to engaging.  There are some standard, template services offered on the site to provide an easy online entry point.  We encourage you to reach out at our email: info@thirdpartythreathunting.com

About our services

Speaking Engagements

Our experts have years of experience in Cybersecurity and Third-Party Risk, creating programs that are successful at reducing risk.  Have one of them speak to your group about how this was accomplished and what the book, "Cybersecurity & Third-Party Risk" can assist in setting up or maturing their programs.

Speaking engagements include a 60-minute speaking session (panel or keynote) with at least two 30-minute prep sessions and the message tailored to the topic of the event or area of interest.

Training and Development

Our experts can educate your staff about how to create or mature a Cybersecurity and Third-Party Risk program.  Learn how to leverage the book's lessons and our years of experience to grow demand for your services.  We can help your sales staff drive demand for your consulting services.

Training will include a 60-minute class (up to 30 participants) with material developed specifically for your team and your desired outcomes.

Signed Copy of The Book

Want a signed copy of the book?  Only $45 with postage included (in the U.S.)

Leadership Development

Have our experts meet directly with your C-level or executive leadership to develop a strategy to deal with this increasing risk at your firm.  We can develop a customized plan or troubleshoot existing issues for recommendations. 

Leadership Development includes up to one 60-minute session with one 30-minute follow-up session and email Q&A for 30 days following the event.

Connect With Us

  • TPTH Articles
  • Blog
  • Privacy Policy
  • Terms and Conditions

Third Party Threat Hunting™

Copyright © 2020 ThirdPartyThreatHunting™ - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept