Third-Party Risk: More Third Parties + Limited Supply-Chain Visibility = Big Risks for Organizations

Discussion Topics

While data breaches are commonplace, occasionally there’s an attack so audacious that its impact reverberates long after the initial jolt. Such was the case with the SolarWinds supply chain breach, in which a nation-state surreptitiously inserted eavesdropping malware into an Oklahoma soft­ware maker’s IT performance management solution used by governments and major enterprises. Organizations — from small businesses to huge government agencies — were easily reminded of how vulnerable they are to cyberattacks through service providers and software with privileged access.

Download this CRA Business Intelligence report – based on surveys of 209 security executives, directors, managers, and IT admins – to learn about:

  • How organizations are impacted by third-party cyberattacks and breaches
  • Key concerns and challenges in managing risks from third parties such as software vendors, IT service providers, business partners, contractors, resellers, and other partners
  • Organizations’ use of solutions and processes to prevent and mitigate third-party risk
  • Guidance to help your organization proactively address third-party risk

Sponsors

0%