Cambridge Univ and BitSight - CYBER SECURITY COST EFFECTIVENESS FOR BUSINESS RISK REDUCTION
This report, conducted by the Cambridge Centre for Risk Studies, shows that investments in security controls can reduce organizations' financial exposure, and modeling financial loss can help companies make better security investment decisions.
Finding Cybersecurity Program Maturity In The Healthcare Sector
Here are several actionable strategies yous can use to prevent cyber attacks & other incidents from occurring within third- and fourth-party networks.
Good Harbor Salon: The Future of Supply Chain Cyber Risk Management After SolarWinds
Bitsight partnered with Good Harbor to host a salon discussion with security leaders from various industries to hear their thoughts on what the breach means for the security industry. Hosted by Richard A Clarke and Bitsight’s Stephen Boyer, the discussion covered a range of topics from what happened, to what we should learn from the event, to what needs to happen next to minimize the damage from future attacks.
Good Harbor Salon: The Future of Supply Chain Cyber Risk Management After SolarWinds
Bitsight partnered with Good Harbor to host a salon discussion with security leaders from various industries to hear their thoughts on what the breach means for the security industry. Hosted by Richard A Clarke and Bitsight’s Stephen Boyer, the discussion covered a range of topics from what happened, to what we should learn from the event, to what needs to happen next to minimize the damage from future attacks.
Managing & Communicating Risk in a Complex Organization
Andy Bien spent a decade as the Chief Information Officer of the Airport Authority of Hong Kong, an organization that underwent a significant digital transformation in recent years under his leadership. Watch to learn how he manages risk in a complex environment.
BitSight For Third-Party Risk Management Datasheet Cover
Learn how Bitsight TPRM can help you launch, grow, and optimize your program—enabling you to make faster, more strategic cyber risk management decisions.