Third-Party Cyber Risk Management Primer: Aug 2023 Update

0
151

Key Points

  • Hackers exploit the trust relationships between organizations and their third-party suppliers and vendors, resulting in potentially damaging targeted and untargeted attacks.
  • Understanding the organizations in a supply chain and critical dependencies is essential to reducing the risk, though some threats are nearly impossible to mitigate.
  • Multiple internal stakeholders working together with technology solutions and consultancy expertise can significantly reduce the risk of, or impact from, sup…

Read More…