Security News
BitSight announced several new, innovative capabilities within its BitSight for Third-Party Risk Management solution that provide intelligent recommendations, operational guidance, and risk prioritization to enable more effective third-party cyber risk management. "Third-party ecosystems are expanding rapidly and organizations of all shapes and sizes struggle to create effective risk management programs," said Dave Fachetti, executive vice president of Strategy.
The success of contact tracing apps will then depend on the overall active uptake by users, and whether the big data analysts have got their figures right. "Numerous vulnerabilities have been discovered like BlueFrag, which affected IOS and Android." He also warns, "Contact tracing apps need to be regularly tested for vulnerabilities and critical updates must be deployed immediately. These apps must also be prohibited from activating smart assistants. People must limit the location settings to run only when approved and when in use."
What are the most unexpected pitfalls for a CISO that wants to strengthen an enterprise third-party risk management program? Before third-party risk management can become a competitive advantage, businesses need to perfect the block-and-tackle basics of third-party risk management.
Censinet, the leading collaborative risk network for healthcare organizations, announced new products and capabilities across three strategic areas - Continuous Monitoring, Controls Validation, and Vendor Lifecycle Workflows. "Healthcare organizations demand faster, higher-quality and more complete risk assessments across their supply chain. It drives our vision of 'taking the risk out of healthcare' and delivering unique capabilities such as One-Click Assessments™," said Ed Gaudet, CEO and founder of Censinet.
In this podcast recorded at RSA Conference 2020, Sean Cronin, CEO of ProcessUnity, talks about the importance of third-party risk management and how companies can get started with a proven process that works. Our flagship product is a vendor risk management product that really focuses on third-party risk and vendor management.
"This lack of confidence shows that many organizations approach risk management in an outdated and ineffective manner," said Matt Shinkman, vice president in the Gartner Risk and Audit practice. Organizations often have policies in place to deal with most risks, but they don't activate them until it's too late because no one is owning the risk or taking it seriously until it is fully manifested.
ProcessUnity, a leading provider of cloud-based applications for risk and compliance management, today announced a new pre-built configuration of its award-winning Vendor Risk Management solution. Best Practices Configuration for ProcessUnity Vendor Risk Management is a pre-configured Third-Party Risk Management program with turn-key workflows, assessments, calculations, risk analysis and reporting, allowing small to midsize organizations to successfully launch and maintain a third-party risk program from day one.
Fusion Risk Management, a leading provider of business continuity and risk management software and services, announced the launch of its Fusion Connector for Everbridge Risk Intelligence - powered by NC4, further extending its long-time partnership with Everbridge, the global leader in critical event management. The Connector provides a managed integration between Fusion's risk management, business resilience, and crisis management SaaS solution and Everbridge's Risk Intelligence Monitoring Center, formerly NC4. The result for enterprise crisis management and business resilience professionals is greater visibility, streamlined work processes, and faster response and recovery from critical business disruptions.
Through 2022, 80% of supply chain blockchain initiatives will remain at a proof-of-concept or pilot stage, according to Gartner. "Today, supply chain leaders have now started to treat blockchain as part of a longer-term technology roadmap and risk management planning. We see that many leaders are adopting a broader end-to-end view across their supply chains and map all requirements - from sourcing across manufacturing to the final distribution," Mr. Stevens added.