Cybersecurity and Third-Party Risk : Third Party Threat Hunting /
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM,...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
Wiley,
[2021]
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Foreword
- Introduction
- Section 1 Cybersecurity Third Party Risk
- Chapter 1 What is the risk?
- Chapter 2 Cybersecurity basics
- Chapter 3 What the COVID-19 Pandemic did to Cybersecurity and Third-Party Risk
- Chapter 4 Third-Party Risk Management
- Chapter 5 Onboarding due diligence
- Chapter 6 Ongoing due diligence
- Chapter 7 On-site due diligence
- Chapter 8 Continuous monitoring
- Chapter 9 Offboarding
- Section 2 Next Steps
- Chapter 10 Securing the Cloud
- Chapter 11 Cybersecurity and legal protections
- Chapter 12 Software due diligence
- Chapter 13 Network due diligence
- Chapter 14 Offshore third-party cybersecurity risk
- Chapter 15 Transform to predictive
- Chapter 16 Conclusion
- Index.