The supply chain has come under increasing attack in the last year, with the SolarWinds and other attacks by Advanced Persistent Threats (APTs) it is clear the bad actors have weaponized the supply chain: if they cannot get to their intended targets directly, they will exploit the weak links in the third and fourth party trusted relationships. The book will provide a reference on how to create a third party risk management program that places cybersecurity at the forefront with techniques and programs to lower the risk to organizations significantly.
Gregory Rasner , SVP Corporate Cyber Security Third Party Risk at Truist Financial Corp,. Prior, he held cybersecurity and information technology leadership roles in technology, biotech, and finance. Teaching part-time at local community colleges and volunteering time for veterans’ causes are his passions. He is proud of his service in the US Marines and a father of five children and a beautiful, smart wife who also is a cybersecurity professional.
Check out www.rasner.com
From Home Depot to Cognizant, third parties (vendors) have too often shown themselves as the weakest link in security to firms. Not only does this lead to financial losses, but reputation loss can last years or drive the business out of the market.
Third Party Threat Hunting™
Copyright © 2020 ThirdPartyThreatHunting™ - All Rights Reserved.