3rd Party Risk Management

Maximize Cybersecurity Risk Ratings in 2019

Insights from the Forrester New Wave: Cybersecurity Risk Rating Solutions, Q4 2018.

If you are a security or risk leader, you know that even with a formal third-party risk program in place, you are not effectively keeping track of all of your third parties. But there is something you can do, and that is to get help from a cybersecurity risk rating solution provider. According to Forrester, these solutions don't merely report on your third-party partners' security flaws, they also contextualize and prioritize the risk information they collect so you can more strategically allocate resources and mitigate risk.

Hit play above to watch this OnDemand webinar featuring Christopher McClean, Vice President, Research Director serving Security & Risk Professionals with Forrester Research, and Kelly White, CEO and Co-founder of RiskRecon to learn about:

  • Insights from the Forrester New Wave: Cybersecurity Risk Rating Solutions, Q4 2018;
  • Lessons learned and best practices to mitigate third-party cyber risk;
  • Leveraging the ratings data to identify and address root cause issues exposing you to excessive risk in your digital supply chain.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 34 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.