3rd Party Risk Management , Governance & Risk Management

OnDemand Webinar | The Ripple Effect - An Examination of Multi-Party Security Incidents

How Another Firm's Breach Could Impact Your Organization.

Software integrations, open APIs, and data sharing between different businesses are a staple of the modern digital organization. Unfortunately, as organizations increase their digital footprint across numerous third-party and fourth-party relationships, their risk of downstream data breaches multiplies. These ripple events are often hidden from the public eye and may not be uncovered for years after the initial event.

During this webinar Kelly White, CEO of RiskRecon, Wade Baker, Co-Founder at the Cyentia Institute, and David Severski, lead data scientist from the Cyentia Institute, discuss the findings from a new research report that analyzed over 800 multi-party security incidents to determine how organizations were impacted from the ripple of a security event.

View this OnDemand webinar and you will learn:

  • How another firm's breach could impact your organization;
  • The methodology behind this exclusive security report;
  • Recommendations for protecting your organization from ripple events.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 37 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.