Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

ASIC research shows 44% of Australian organisations are not managing third-party supply chain risk. Tesserent says it remains a key risk, and disruption could emerge from geopolitical tensions. Continue reading Third-Party Supply Chain Risk a Challenge for Cyber Security Professionals in Australia

Ask the Expert: What is the Board asking audit teams concerning Nth-party risk?

Dawn Ward, Senior Solution Consultant at Iceberg Networks and Chris Murphey, VP Advisory Services at Iceberg Networks, discuss what the Board of Directors is asking internal audit teams around Nth-party risk. The following is an edited transcript of th… Continue reading Ask the Expert: What is the Board asking audit teams concerning Nth-party risk?

Ask the Expert: How has audit’s role in evaluating third-party risk changed in the last year?

Dawn Ward, Senior Solution Consultant at Iceberg Networks and Chris Murphey, VP Advisory Services at Iceberg Networks, discuss how evaluating the Third-Party Risk Management program has evolved for internal auditors. The following is an edited transcri… Continue reading Ask the Expert: How has audit’s role in evaluating third-party risk changed in the last year?

Ask the Expert: How has third-party risk changed in the last year?

Dawn Ward, Senior Solution Consultant at Iceberg Networks and Chris Murphey, VP Advisory Services at Iceberg Networks, discuss how the third-party risk landscape has evolved in the last year. The following is an edited transcript of the conversation. D… Continue reading Ask the Expert: How has third-party risk changed in the last year?

4 Questions that are Top of Mind for Chief Audit Officers in 2021

With the pandemic still a present factor in our personal and professional lives, it has shifted the way we work and the way businesses operate—and most of the changes we’ve made to adapt to the situation are likely here to stay. Having made such a sudd… Continue reading 4 Questions that are Top of Mind for Chief Audit Officers in 2021

Tokyo Olympics organizers’ data swept up in Fujitsu hack: report

The organizing committee of the Tokyo Olympics is the latest victim of a breach in which hackers broke into a Japanese government contractor’s data-sharing tool, according to a Japanese media report. The breach affected some 170 people who participated in a cybersecurity drill ahead of the Olympic Games next month, Kyodo News reported. The leaked data included the names and affiliations of people from 90 organizations involved in hosting the Olympics, according to the outlet. It’s apparently the latest Japanese organization to be swept up in an incident that began with unidentified attackers accessing data-sharing software made by technology firm Fujitsu. The breach of the tool last month has reportedly given hackers access to data at multiple Japanese government ministries. Fujitsu has suspended use of the software as it investigates the breach. The Japanese government’s National Center of Incident Readiness and Strategy for Cybersecurity (NISC), which hosted the cybersecurity drill, […]

The post Tokyo Olympics organizers’ data swept up in Fujitsu hack: report appeared first on CyberScoop.

Continue reading Tokyo Olympics organizers’ data swept up in Fujitsu hack: report

The Week in Breach News: 05/12/21 – 05/18/21

It’s the all ransomware edition featuring huge breaches at Toshiba & the VA plus a special report on the state of phishing security in 2021.
The post The Week in Breach News: 05/12/21 – 05/18/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 05/12/21 – 05/18/21

The Week in Breach News: 04/28/21 – 05/04/21

Huge Codecov breach creates risk shockwave, selling security to budget-minded clients & your customer retention blueprint.
The post The Week in Breach News: 04/28/21 – 05/04/21 appeared first on Security Boulevard.
Continue reading The Week in Breach News: 04/28/21 – 05/04/21

Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

Clients love the ID Agent Digital Risk Protection Platform. But don’t take our word for it – hear from them directly in 2 new case studies!
The post Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses … Continue reading Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

RPA, IoT Device, and Bot Identity and Access Lifecycle Management Made Easy

SecZetta introduces a new capability to its Third-Party Identity Risk solution to mitigate the risk that “non-human” workers present.    The term “non-human worker” refers to robotic process automation (RPAs), IoT devices, and bots (chat and transactio… Continue reading RPA, IoT Device, and Bot Identity and Access Lifecycle Management Made Easy