Gregory C. Rasner - Cybersecurity and Third-Party Risk

Здесь есть возможность читать онлайн «Gregory C. Rasner - Cybersecurity and Third-Party Risk» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Cybersecurity and Third-Party Risk: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Cybersecurity and Third-Party Risk»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management.
In
, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization’s network by third parties. You’ll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation.
The author discusses how to conduct due diligence on the third parties connected to your company’s networks and how to keep your information about them current and reliable. You’ll learn about the language you need to look for in a third-party data contract whether you’re offshoring or outsourcing data security arrangements.
Perfect for professionals and executives responsible for securing their organizations’ systems against external threats,
is an indispensable resource for all business leaders who seek to:
Understand the fundamentals of third-party risk managementConduct robust intake and ongoing due diligencePerform on-site due diligence and close vendor risksSecure your software supply chainUtilize cloud and on-premises software securelyContinuously monitor your third-party vendors and prevent breaches

Cybersecurity and Third-Party Risk — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Cybersecurity and Third-Party Risk», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Cybersecurity operations teams have been developing at an ever‐increasing pace in the last 10 years, especially after the Sony Pictures hack in 2014, which showed that a foe like a state actor with determination and nearly unlimited resources (unlike a script kiddie or even criminal hackers) can get into any company and disclose such deeply embarrassing details. There are firewall and router certifications for ethical hacking and for security that focus solely on finding or preventing the bad actors. However, none of them spend any amount of time on learning how to secure company data at the third parties. Indeed, this is an area for improvement as the cybersecurity professionals begin to learn how to perform at a higher level on third‐party risk.

Business or Technology Risk and Cybersecurity Risk

Many companies of larger size have departments or groups that are designed to manage and report risk for the whole company. These teams are very important as centralized groups for risk management at big organizations. Often, these teams perform the process and compliance work for third‐party risk, including the cybersecurity domain.

While these professionals are trained and certified in how to evaluate risk within an organization, the issue of evaluating cybersecurity risk produces better results when performed by trained and certified cybersecurity professionals. The cybersecurity domain is very complex, as illustrated in the section titled “Cybersecurity and Third‐Party Risk.” Even within the field, there are numerous specialty fields and certifications along with a fast‐changing environment. Expecting a generalist risk professional to opine on controls for information security topics might produce adequate, but not necessarily accurate, data.

In cases where a risk organization consists of general risk professionals who don't have the specialty training and experience of cybersecurity professionals, it is optimal if these professionals, like the TPRM team, collaborate with the cybersecurity teams at their company for that level of expertise.

Cybersecurity Third‐Party Risk as a Force Multiplier

Military science uses a term called force multiplier , which refers to a combination of circumstances that gives personnel the ability to amplify their normal capabilities to achieve greater goals. In modern times, the Global Positioning System (GPS) has been a force multiplier, as it enabled more personnel to be moved at a faster pace due to the capabilities added from the technology. In the U.S. Special Forces, a lot of time is spent on creating and training local fighter forces as a form of a force multiplier. The small force of a 12‐man unit can go out and lead a unit of 100–200 local fighters. The force multiplier here is the U.S. Special Forces troops growing in strength from 12 to 200. A cybersecurity team, partnering with TPRM, can be a force multiplier to strengthen the risk management of third parties.

As understood, the cybersecurity field is complex and full of certifications, specialties, technical details, and domains. This complexity can be simplified for a TPRM team when a specialized team of cybersecurity professionals are able to execute on an active threat hunting mentality in reference to third parties. The whole TPRM and business risk teams do not have to be experts in information security, but they can use the force multiplier effect of a few good cybersecurity special forces. These special forces are trained to monitor security controls at vendors, to ensure that enemy forces are reined in by contractual obligations, to constantly watch for new threats, and to partner with vendors to train their local forces to better fight the enemy directly. The collaboration and teamwork between the cyber and TPRM professionals continually sharing and updating reference documents multiplies the strengths of both teams.

TPRM must grow its strength in cybersecurity. Cybersecurity must increase its own research, resources, and results on third‐party risk. For those in business and cybersecurity as well as TPRM, this is an opportunity to exponentially grow cybersecurity across industries. If the TPRM process grew its cybersecurity with a force multiplier approach, and cybersecurity research and resources were focused more on third‐party risk, we would more broadly adopt what is required: a rethink of cybersecurity and third‐party risk. This adoption would include a practice around vendor risk management that places cybersecurity at the forefront, and a cybersecurity team that uses the same resources as cyber operations threat analysts.

The earlier statistic that stated the average company is connected with 600 vendors with PII becomes the exponential part. As more companies adopt a cybersecurity and third‐party risk approach and are able to partner with these vendors, across multiple industries, we get real security change across all the third parties. It's a simple math equation: It becomes a multiplier for better corporate information security across the globe.

Conclusion

The evidence of the risk exists: At the end of 2020, in one month there were three nation‐state APT attacks that exploited weaknesses in supply chain cybersecurity. Two of them were aimed at two countries: Mongolia and Vietnam. The damage and scope of the SolarWinds Orion exploit is not yet known as more victims are being uncovered, but it does include big names in technology and major government systems globally. The advanced persistent actors (i.e., hackers) are clearly targeting and weaponizing the supply chain. They have discovered that third‐party cybersecurity is the weakest link to their actual targets.

The investment that CISOs and cybersecurity professionals have made in the last 20 years has been proven effective in many ways. Most companies and governments that know they will be a target (due to size, money, power) have beefed up their own cybersecurity. But behind these medium and large organizations are thousands or millions of smaller companies that are focused on selling, not securing, their data. Cybersecurity can lean into this area more forcefully, trying and implementing new capabilities learned from other cyber domains and leadership. The need is to take Cybersecurity Third‐Party Risk from a compliance‐driven effort to an active always learning, always searching for risk approach in order to lower risk from vendors.

Chapter 2 Cybersecurity Basics

While this book does not require the reader to be either a risk expert or cybersecurity expert, given there will be terminology and process discussions on some cybersecurity topics, some time spent on the terminology and the subject matter is warranted.

Cybersecurity has three main pillars: Confidentiality, Integrity and Availability (CIA):

Confidentiality: Prescribes only authorized users and systems should be able to access or modify data.

Integrity: Data should be maintained in a correct state and cannot be improperly modified.

Availability: Authorized users should be able to access data when needed.

This is called the CIA Triad as shown in Figure 2.1.

FIGURE 21The CIA Triad These pillars are designed to break down the - фото 2

FIGURE 2.1The CIA Triad

These pillars are designed to break down the complexities of cybersecurity to determine how to best make decisions. For example:

Does the vendor store our data in ways that make it more secure?

Will this product ensure the integrity of our data in the cloud?

Can the vendor ensure that the data will be available when required to those who need it?

Because this book is mainly focused on third parties, references will be aligned with that focus in mind. It is not about what security your organization is performing, but what is going on at the third party, both with the specific services they provide and also how they secure their own enterprise. We include several examples of how a vendor's connection is used to target a company, and how their company‐wide cyber controls directly impact the ability to protect a company's data and any connection to your network (both intermittent and persistent).

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Cybersecurity and Third-Party Risk»

Представляем Вашему вниманию похожие книги на «Cybersecurity and Third-Party Risk» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Cybersecurity and Third-Party Risk»

Обсуждение, отзывы о книге «Cybersecurity and Third-Party Risk» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x