Download this new study that analyzes nearly 900 historical ripple events to identify the top MITRE ATT&CK techniques used.
Get this new report that examined more than 50,000 B2B relationships to understand the impact of poor security assessment practices.
Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors.
Becoming ISO 27001 certified may be the next necessary step in your cybersecurity plan. Read our article detailing everything you need to know about the ISO 27001 Global Standard.
Download this new study that analyzes nearly 900 historical ripple events to identify the top MITRE ATT&CK techniques used.
Get this new report that examined more than 50,000 B2B relationships to understand the impact of poor security assessment practices.
Get a free 30-day trial of the RiskRecon portal and see the ratings of up to 50 vendors.
Becoming ISO 27001 certified may be the next necessary step in your cybersecurity plan. Read our article detailing everything you need to know about the ISO 27001 Global Standard.
Featured Speakers: Roger Ison-Haug, CISO, StormGeo; Mirco Rohr, Director of Solutions Consulting, Mastercard
The impact of DORA and NIS2 on third-party risk management programs is significant. Both regulations require organizations to assess and manage the cybersecurity risks posed by their third-party suppliers and vendors. This means that companies must implement stronger due diligence processes when selecting and monitoring third-party vendors.
To comply with DORA and NIS2, companies must also have a better understanding of their supply chain and the potential risks that could be introduced through third-party relationships. This requires organizations to develop more comprehensive risk management programs that include regular risk assessments, ongoing monitoring, and clear communication with third-party vendors about security requirements.
During this session attendees will: