Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
Home > BitSight Technologies > Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability
 

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

White Paper Published By: BitSight Technologies
BitSight Technologies
Published:  Feb 20, 2015
Type:  White Paper
Length:  7 pages

As cyber attacks through third parties become more commonplace, IT decision makers have focused much of their energy on the cyber security of their vendors. It can be a challenge to manage so many partnerships. Due to the desire for more data-driven decisions, IT professionals are looking for an automated solution to scale security performance management efforts.

Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk. 

This study describes:

  • The top concerns of IT professionals
  • How IT has been incorporated into more lines of business
  • Which types of risks IT professionals are most interested in tracking (and managing)
  • The disconnect between the desire for continuous monitoring and the types of tools currently used to gather data.



Tags : 
networking, security, software development, it management, enterprise applications, platforms, data center