Companies remain on the hook for ensuring their vendors are up to task when it comes to cybersecurity, privacy compliance and continuity of operations. This checklist can help determine the maturity of your vendor risk management program.
Hackers are outpacing and adapting their techniques at a faster pace than defenders, and nearly half of all cyberattacks are resulting in financial damages over $500,000, including lost revenue, customers, opportunities and out-of-pocket costs.
Forty-one percent of investors and analysts are now extremely concerned about cyber threats, ranking it as the largest threat to business, according to the PwC Global Investor Survey 2018.
With the growing visibility around cyber breaches, there is now a heightened sensitivity among corporate boards and executive teams as they become more engaged in the management of cyber risk, and its ability to impact their business and personal indemnity.
Atlanta city employees coming to work this morning were handed an unusual notice: don’t turn on your computers. The municipal systems had been hit with a ransomware attack on Thursday, and employees were not to use their computer until they were cleared by the municipal IT group.
A key factor in establishing trust is the presence of a Security Operations Center (SOC). The SOC is charged with monitoring and protecting many assets, such as intellectual property, personnel data, business systems and brand integrity.