Third Party Threat Hunting™

Third Party Threat Hunting™Third Party Threat Hunting™Third Party Threat Hunting™

Third Party Threat Hunting™

Third Party Threat Hunting™Third Party Threat Hunting™Third Party Threat Hunting™
  • Home
  • Services/Products
  • The Book
  • Upcoming Events
  • Blog
  • More
    • Home
    • Services/Products
    • The Book
    • Upcoming Events
    • Blog
  • Sign In
  • Create Account

  • Orders
  • My Account
  • Signed in as:

  • filler@godaddy.com


  • Orders
  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Services/Products
  • The Book
  • Upcoming Events
  • Blog

Account


  • Orders
  • My Account
  • Sign out


  • Sign In
  • Orders
  • My Account

cybersecurity & third party risk: third party threat hunting

What's in the book?

The book is over 400 pages, 16 chapters of detailed, hands-on how to implement a world-class Third Party Risk Management program with Cybersecurity at the forefront.  

Endorsed by (ISC)2

This premiere cybersecurity certification and education organization has endorsed the book, without any edits suggested - they endorsed it  as the author had written it.  

"The Exact Right Book at the Exact Right Time" - Adam Gordon

Along with cybercriminals, the advanced threat actors have figured out that the weakest link into your network is through your third and fourth parties (vendors).   The book details how to lower the risk from these cyber hackers.

Foreword by Edna Conway - Chief Security & Risk Officer, Azure

"Cybersecurity & Third-Party Risk should be added to the bookshelves of all security and risk professionals, regardless of industry in which they operate....consider yourself fortunate to have access to Greg's expertise and his thoughtful and comprehensive approach to a challenge we must all consider a priority"  


Covers an impressive array of subjects:

  • Understand the fundamentals of Cybersecurity and Third Party Risk Management
  • Conduct robust Intake and Ongoing Due Diligence
  • Perform On-site Due Diligence and close vendor risks
  • Lower risk with effective contract controls
  • Secure your software supply chain
  • Secure your vendors' cloud and software
  • Continuously monitor your third parties and prevent breaches

Shipping Now!

It is available for order at Wiley and Amazon .

About Third Party Threat Hunting™

Cybersecurity and Third Party Risk (Third Party Threat Hunting)

The supply chain has come under increasing attack in the last year, with the SolarWinds and other attacks by Advanced Persistent Threats (APTs) it is clear the bad actors have weaponized the supply chain: if they cannot get to their intended targets directly, they will exploit the weak links in the third and fourth party trusted relationships.  The book will provide a reference on how to create a third party risk management program that places cybersecurity at the forefront with techniques and programs to lower the risk to organizations significantly.  


The book is available for order at Amazon and  the Wiley websites.  

About Greg

  Greg has worked as a cybersecurity and IT leader in Finance, Biotech, Technology and Software fields.  He holds a BA  from Claremont McKenna College along with certifications: CISSP, CCNA, CIPM, ITIL.  He is the author of the book “Cybersecurity and Third Party Risk: Third Party Threat Hunting” published by Wiley, written several online articles for major publications,  and is a frequent speaker at forums and conferences on related topics.  He has five kids and a wife who is also a cybersecurity professional.  Rasner was in the USMC and is co-chair for the Truist  Veterans and First-Responders Business Resources Group.  Greg created the cybersecurity program at Johnston Community College, is a board member on the Technology Advisory Board, and teaches there part-time at JCC as well.  Fun for him is camping and traveling with his family.  

Check out www.rasner.com 

Why are Third Parties so Risky?

From Home Depot to Cognizant, third parties (vendors) have too often shown themselves as the weakest link in security to firms.  Not only does this lead to financial losses, but reputation loss can last years or drive the business out of the market.  

  • TPTH Articles
  • Blog
  • Privacy Policy
  • Terms and Conditions

Third Party Threat Hunting™

Copyright © 2020 ThirdPartyThreatHunting™ - All Rights Reserved.

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept