The supply chain has come under increasing attack in the last year, with the SolarWinds and other attacks by Advanced Persistent Threats (APTs) it is clear the bad actors have weaponized the supply chain: if they cannot get to their intended targets directly, they will exploit the weak links in the third and fourth party trusted relationships. The book will provide a reference on how to create a third party risk management program that places cybersecurity at the forefront with techniques and programs to lower the risk to organizations significantly.
Greg has worked as a cybersecurity and IT leader in Finance, Biotech, Technology and Software fields. He holds a BA from Claremont McKenna College along with certifications: CISSP, CCNA, CIPM, ITIL. He is the author of the book “Cybersecurity and Third Party Risk: Third Party Threat Hunting” published by Wiley, written several online articles for major publications, and is a frequent speaker at forums and conferences on related topics. He has five kids and a wife who is also a cybersecurity professional. Rasner was in the USMC and is co-chair for the Truist Veterans and First-Responders Business Resources Group. Greg created the cybersecurity program at Johnston Community College, is a board member on the Technology Advisory Board, and teaches there part-time at JCC as well. Fun for him is camping and traveling with his family.
Check out www.rasner.com
From Home Depot to Cognizant, third parties (vendors) have too often shown themselves as the weakest link in security to firms. Not only does this lead to financial losses, but reputation loss can last years or drive the business out of the market.
Third Party Threat Hunting™
Copyright © 2020 ThirdPartyThreatHunting™ - All Rights Reserved.