Cargando…

Cybersecurity and Third-Party Risk : Third Party Threat Hunting /

STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM,...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rasner, Gregory C.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : Wiley, [2021]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Foreword
  • Introduction
  • Section 1 Cybersecurity Third Party Risk
  • Chapter 1 What is the risk?
  • Chapter 2 Cybersecurity basics
  • Chapter 3 What the COVID-19 Pandemic did to Cybersecurity and Third-Party Risk
  • Chapter 4 Third-Party Risk Management
  • Chapter 5 Onboarding due diligence
  • Chapter 6 Ongoing due diligence
  • Chapter 7 On-site due diligence
  • Chapter 8 Continuous monitoring
  • Chapter 9 Offboarding
  • Section 2 Next Steps
  • Chapter 10 Securing the Cloud
  • Chapter 11 Cybersecurity and legal protections
  • Chapter 12 Software due diligence
  • Chapter 13 Network due diligence
  • Chapter 14 Offshore third-party cybersecurity risk
  • Chapter 15 Transform to predictive
  • Chapter 16 Conclusion
  • Index.