What you will learn:
- The security risks third parties pose
- Why governance must include data management
- How to conduct a third party assessment
Research conducted by Harris Poll and analyzed by Ovum finds that, globally, 89% of more than 800 senior business managers and IT professionals who responded felt their organization is now more at risk from insider attacks; 34% felt very or extremely vulnerable.
The report emphasizes the growth in the range of miscreants that can be classified as insiders making the threat environment more difficult to deal with as it moves beyond employees and privileged IT staff.
Given the prevalence of third-parties involved in critical business operations and granted access to business networks and data, this white paper covers the importance for companies to understand how to govern and assess third-party vendors to ensure the integrity of their security programs. While outsourcing business processes and infrastructure elements to third parties may offer convenience, efficiency and reduced operational costs, it can also be a gateway to significant risks.