Cybersecurity Leadership
20.9K views | +21 today
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Supply Chain Cybersecurity – The Importance of Everyone

Supply Chain Cybersecurity – The Importance of Everyone | Cybersecurity Leadership | Scoop.it
Security isn't just for your organisation, you also need to get closer to your suppliers, especially those providing critical services.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three Questions To Ask Third-Party Vendors About Cybersecurity Risk

Three Questions To Ask Third-Party Vendors About Cybersecurity Risk | Cybersecurity Leadership | Scoop.it
How can companies apply rigor when evaluating the security of their software vendors and managed service providers? 
No comment yet.
Scooped by JC Gaillard
Scoop.it!

When It Comes To Cyber Risk, You're Only As Safe As Your Vendors

When It Comes To Cyber Risk, You're Only As Safe As Your Vendors | Cybersecurity Leadership | Scoop.it

If anyone up or down the supply chain has access to your networks, data or internet connectivity, threat vectors may exist that comingle your vulnerabilities.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Three Lessons CISOs Can Learn from the SolarWinds Cyberattack

Three Lessons CISOs Can Learn from the SolarWinds Cyberattack | Cybersecurity Leadership | Scoop.it
The ripple effects of SolarWinds are a painful example of how crucial it is for organizations in India to prioritize third-party security.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is Third-Party Software Leaving You Vulnerable to Cyberattacks?

Is Third-Party Software Leaving You Vulnerable to Cyberattacks? | Cybersecurity Leadership | Scoop.it
The SolarWinds hack highlights the importance of vetting your vendors.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybersecurity: Why your suppliers are still your weakest link

Cybersecurity: Why your suppliers are still your weakest link | Cybersecurity Leadership | Scoop.it
Mature organisations at the top of the supply chain have a duty of care to their suppliers - and that can help everyone.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

6 Questions to Ask Your Cloud Provider Right Now

6 Questions to Ask Your Cloud Provider Right Now | Cybersecurity Leadership | Scoop.it

Experts share the security-focused issues all businesses should explore when researching and using cloud services.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

It's Time to Rethink Third-Party Risk Assessment

It's Time to Rethink Third-Party Risk Assessment | Cybersecurity Leadership | Scoop.it
Continuously evaluating and updating your third-party risk assessment can improve your security posture and ensure your company doesn't have the next headline-making incident.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

3 Steps to Automate Your Third-Party Risk Management Program

3 Steps to Automate Your Third-Party Risk Management Program | Cybersecurity Leadership | Scoop.it

With more organizations sharing data with more third-party vendors, it shouldn't be surprising that more than 50% of security incidents in the past two years have stemmed from a third-party with access privileges, according to a CyberRisk Alliance report.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How cloud-native is changing the role of the CISO

How cloud-native is changing the role of the CISO | Cybersecurity Leadership | Scoop.it
Here's why CISOs need to embrace cloud-native, get to know its advantages, and understand the change it introduces to security practices.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How can a business ensure the security of their supply chain?

How can a business ensure the security of their supply chain? | Cybersecurity Leadership | Scoop.it

In the first quarter of 2021, 137 organizations reported experiencing supply chain attacks at 27 different third-party vendors, while the number of supply chain attacks rose 42% from the previous quarter.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

When it Comes to Cloud Security, is Your Company Suffering from Supplier Stockholm Syndrome?

When it Comes to Cloud Security, is Your Company Suffering from Supplier Stockholm Syndrome? | Cybersecurity Leadership | Scoop.it
When it comes to cloud security is your company suffering from supplier Stockholm syndrome? This examines the main antidotes to address the issues raised.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber Security & the Cloud: Welcome back to the “Trust-But-Verify” era…

Cyber Security & the Cloud: Welcome back to the “Trust-But-Verify” era… | Cybersecurity Leadership | Scoop.it
For regulated industries, blind trust will never be enough; being able to demonstrate a degree of due-diligence on key vendors will always be essential
No comment yet.
Scooped by JC Gaillard
Scoop.it!

​GDPR and the Cloud: How to manage suppliers in a changing world

​GDPR and the Cloud: How to manage suppliers in a changing world | Cybersecurity Leadership | Scoop.it

Technology decision-makers face a tough task governing the ecosystem of partners that surrounds the modern digital business. Alan Roger, senior analyst at researcher Ovum, says the complexities associated with vendor management continue to increase.

No comment yet.