Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
The book is over 400 pages, 16 chapters of detailed, hands-on how to implement a world-class Third Party Risk Management program with Cybersecurity at the forefront.
This premiere cybersecurity certification and education organization has endorsed the book, without any edits suggested - they endorsed it as the author had written it.
Along with cybercriminals, the advanced threat actors have figured out that the weakest link into your network is through your third and fourth parties (vendors). The book details how to lower the risk from these cyber hackers.
"Cybersecurity & Third-Party Risk should be added to the bookshelves of all security and risk professionals, regardless of industry in which they operate....consider yourself fortunate to have access to Greg's expertise and his thoughtful and comprehensive approach to a challenge we must all consider a priority"
It is available for order at Wiley and Amazon .
The supply chain has come under increasing attack in the last year, with the SolarWinds and other attacks by Advanced Persistent Threats (APTs) it is clear the bad actors have weaponized the supply chain: if they cannot get to their intended targets directly, they will exploit the weak links in the third and fourth party trusted relationships. The book will provide a reference on how to create a third party risk management program that places cybersecurity at the forefront with techniques and programs to lower the risk to organizations significantly.
The book is available for order at Amazon and the Wiley websites.
Greg has worked as a cybersecurity and IT leader in Finance, Biotech, Technology and Software fields. He holds a BA from Claremont McKenna College along with certifications: CISSP, CCNA, CIPM, ITIL. He is the author of the book “Cybersecurity and Third Party Risk: Third Party Threat Hunting” published by Wiley, written several online articles for major publications, and is a frequent speaker at forums and conferences on related topics. He has five kids and a wife who is also a cybersecurity professional. Rasner was in the USMC and is co-chair for the Truist Veterans and First-Responders Business Resources Group. Greg created the cybersecurity program at Johnston Community College, is a board member on the Technology Advisory Board, and teaches there part-time at JCC as well. Fun for him is camping and traveling with his family.
Check out www.rasner.com
From Home Depot to Cognizant, third parties (vendors) have too often shown themselves as the weakest link in security to firms. Not only does this lead to financial losses, but reputation loss can last years or drive the business out of the market.
Third Party Threat Hunting™
Copyright © 2020 ThirdPartyThreatHunting™ - All Rights Reserved.
We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.