How Continuous Third Party Monitoring Can Improve Information Security
Nick Gagalis | February 25, 2015
As cyber attacks via third parties become more commonplace, IT decision makers have put the spotlight on the cyber security of their vendors. According to data from a commissioned study, conducted by Forrester Consulting on behalf of BitSight, IT departments among enterprises in the US, UK, France and Germany allocated 21% of their overall IT spending to third parties. That equates to over $270 billion annually in the US alone. That study details the desires of IT professionals and the abilities they would like to have to manage cyber risk.
It can be difficult to manage so many different partnerships, especially for companies with hundreds or thousands of vendors. Those considerations have forced IT decision makers to look for data-driven, automated solutions that can scale security performance management.
Current Tools Aren’t Enough to Effectively Manage Third Party Cyber Risks
While IT professionals acknowledge that they want to continuously manage the cyber risks in their network, the solutions they currently use don’t give them that privilege. According to the study, only 23% of organizations formally track threat intelligence practices monthly or more.
The following graph shares which types of supplier-related risks IT professionals are most interested in tracking and managing. Almost two-thirds of surveyed professionals would like to have more data about the risk of losing critical company data and/or the threat of cyberattacks.
The chart below shares the percentage of survey participants that believe continuous monitoring can help in the areas listed. More than half of the respondents think continuous monitoring will make it easier to identify and remediate threats, compare security postures of various companies and track industry trends.
What other interesting data came out of the study?
Join us for a webinar on Thursday, February 26 at 11:30am EST to learn how continuous third party monitoring can help your company manage and mitigate cyber risks across your extended enterprise. During the discussion between Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy, you will learn:
Which industries stand to benefit most from using automated, objective information security data
Other findings from the study and their importance in the cybersecurity landscape
Specific use cases of continuous monitoring helping companies improve information security performance.
If you’re using a “one-size fits all” approach to managing your vendor lifecycle, you are missing opportunities to save money and operate more efficiently. Vendor management efficiencies don’t end in the onboarding stage: using a...
If you’re experiencing frustrating delays and procedural roadblocks during your vendor management process, you’re not alone. Security managers are seeing an increase in the number of third-parties integrating with their business, and ...
During this dynamic and stressful workplace environment 2020 has brought us, finding the most efficient ways to perform in your job has never been more important. When it comes to managing your vendor lifecycle, there are three ways you...