Flipping the Odds by Innovating Your Approach to Third Party Risk

Being aware of vulnerabilities from third party vendors is only the start of an effective third party risk management program. Businesses need to consider a comprehensive approach that implements both detection and threat response across all of their connected partners – all of their cyber attack surface. A well-orchestrated threat response poses far-reaching benefits, as well as technical challenges on a business’ security infrastructure, including how to use threat intelligence and deception technologies across their organization. This presentation explores the challenges faced when adversaries attack businesses in a coordinated campaign and proposes how those businesses can implement effective, coordinated threat responses.