<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1175921925807459&amp;ev=PageView&amp;noscript=1">
Vendor Risk Management

Risky Business Services: Who’s Accessing Your Corporate Data?

Noah Simon | August 19, 2015

When most people think about mitigating cyber risk from their business service providers, they usually think of their banks, IT service providers, or their software manufacturers.

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark However, in this infographic we’ve explored the security performance of Law, Accounting, Public Relations, and Benefits Administration firms -- services that are frequently used, but less acknowledged as sources of cyber risk. We’ve recently explained why these sectors are so crucial to monitor: they hold sensitive data on company earnings, trade secrets, and personally identifiable information (PII) on employees and customers. The recent data breaches of prominent newswires is a perfect illustration of what can happen when the cyber performance of third parties holding sensitive information is overlooked. In this breach, hackers accessed nonpublic information which resulted in more than $100 million in profitable trades.

See the infographic below to see how these sectors compare and register for this webinar to learn more:

BizSvcsInfographicweb

Click here to download the full infographic. 

 

DOWNLOAD GUIDE: 5 WAYS VENDOR RISK MANAGEMENT PROGRAMS LEAVE YOU IN THE DARK (& WHAT YOU CAN DO ABOUT IT)

Download Guide: 5 Ways Vendor Risk Management Programs Leave You In The Dark We've drilled down into areas that vendor risk management programs leave a little vague. 

Download the guide to see if you've considered these critical areas of vendor risk management.

 

Suggested Posts

Worthwhile TPRM Certifications for Security & Risk Professionals

As the importance of third-party risk management (TPRM) continues to grow, organizations are hiring for related roles more seriously than ever before. To compensate, security and risk professionals are seeking out certification programs in...

READ MORE »

Which Third-Party Risk Management Tools Do You Really Need?

With high-profile breaches being traced back to supply chain vulnerabilities and a regulatory environment that’s waking up to the realities of vendor risk, many organizations are investing heavily in third-party risk management (TPRM)...

READ MORE »

New Study: Organizations Struggle to Manage Cyber Risk in Their Supply Chains

A new report from McKinsey & Company sheds light on something we’ve known for many years – organizations are struggling to make significant progress in managing cybersecurity risk in their supply chains.

READ MORE »

Subscribe to get security news and updates in your inbox.