back to top

Trending Content:

Jack and Jill Lavatory 101: Execs, Cons, and Inspo

Do you end up perpetually including picture after picture...

The Most Costly Residence Gross sales in Phoenix, AZ in Could 2025

Phoenix has loved a rising inhabitants for many years,...

Announcement Abstract: Cybersecurity Summit August 2021 | Cybersecurity

Cybersecurity Summit is Cybersecurity’s quarterly digital occasion the place we focus on the way forward for cybersecurity with safety leaders throughout the globe.

In the course of the newest Cybersecurity Summit, on August 18, 2021, some thrilling bulletins have been made about new and upcoming options.

The main points are summarized under.

Remediation Planner

With out visibility into the projected enhancements to safety posture, it’s troublesome to ascertain an environment friendly safety program.

With Cybersecurity’s new Remediation Planner, now you can see the potential affect on safety scores alongside every remedial motion. 

This can assist you to set up a extremely environment friendly remediation course of the place the dangers that can have the best constructive affect on safety posture are addressed first.

Remediation Planner by Cybersecurity

‍Key advantages of the Remediation Planner

Helps a extra environment friendly distribution of remediation efforts.Gives stakeholders with superior publicity to future safety posture enhancements.Helps you keep a resilient safety posture throughout digital transformation.

For a walk-through of Cybersecurity’s Remediation planner, seek advice from the video under: 

For extra details about how this function solves the issues limiting typical remediation packages, seek advice from Cybersecurity’s threat remediation planning whitepaper.

Vendor Belief Web page

Cybersecurity’s Vendor Belief Web page function (previously Shared Profile) offers distributors the choice of making a safety profile for his or her firm to proactively share safety info with anybody requesting entry to it.

By requesting entry to those profiles you’ll be able to considerably scale back the time spent on safety assessments.

This function additionally tremendously advantages distributors as a result of it’s going to scale back the cyclical administrative burden of supplying safety particulars to new enterprise companions. It can additionally enhance a vendor’s possibilities of increasing enterprise partnerships by demonstrating exemplary cybersecurity due diligence.

Distributors can publish the next info on their Belief Web page:

Firm description – A transparent rationalization of what a vendor does.Safety scores – Distributors have the choice to incorporate their safety score and the {industry} common score.Safety spokesperson contact info – Contact info for key staff within the safety workforce.Accomplished safety questionnaires – By sharing accomplished questionnaires, distributors will assist their shoppers reduce the time spent on comparable assessments.Any supporting safety documentation – Any security-related documentation or compliance certifications corresponding to PCI DSS, SOC 2, ISO 27001, FedRAMP, and so on.

Key advantages of Vendor Belief Pages

Keep away from answering the identical safety questions a number of occasions.Reduces time spent on safety assessments.Distributors can show their dedication to cybersecurity by proactively sharing their safety efforts with present and new companions.Reduces vendor onboarding time.The handy abstract of key safety particulars streamlines vendor suggestions with different companies.

For a walk-through of Cybersecurity’s Vendor Belief Web page, seek advice from the video under:

Incidents and Information Feed

This superior publicity to cyber incidents impacting present or potential distributors promotes preemptive response efforts that might considerably scale back the affect of provide chain assaults.

The feed breaks down every incident by date, severity, impacted firm, and occasion abstract. 

Incidents and news feed by UpGuard Incidents and Information feed by UpGuardProvides essential breach context for threat assessments.Compliments Cybersecurity’s Identification Breaches function which identifies staff which have had their credentials uncovered in third-party breaches.Promotes preemptive safety response efforts to reduce the affect of provide chain assaults.

Upcoming Options

Cybersecurity’s improvement workforce can be engaged on the next options throughout the upcoming quarter:

1. Vendor Comparability 

It’s essential so that you can rigorously think about all the potential safety dangers a brand new vendor might introduce. With Vendor Comparability, you’ll be able to carry out a side-by-side safety posture comparability for a number of distributors. 

This function will streamline the onboarding course of by serving to you rapidly consider a potential vendor’s cybersecurity program towards their opponents – merely select an inventory of distributors and Cybersecurity will generate a single report evaluating them for you.

2. Vendor Tiering

In your third-party threat administration program, prioritizing your vendor threat assessments by criticality is crucial. Crucial distributors require extra complete cyber threat assessments. 

Vendor tiering helps you classify, or tier, distributors based mostly on the diploma of sensitivity of the assets they entry, and the criticality of the seller relationship – the upper the tier, the extra crucial the seller.

This can assist you to ship focused threat assessments based mostly on the particular tier every vendor belongs to – additional increasing Cybersecurity’s customization capabilities past its Questionnaire Builder.

3. Compliance and Safety Requirements

Compliance and Safety Requirements assist you to measure every vendor’s degree of compliance with industry-standard frameworks like ISO 27001 and NIST CSF. 

Via a generated report, you’ll be able to assess general compliance towards chosen requirements based mostly on safety questionnaire responses and assault floor scans. This can allow you to uncover any compliance gaps that may then be particularly addressed.

4. Customized Notifications

In cybersecurity, time is a valuable commodity, so it shouldn’t be wasted by studying by irrelevant notifications. 

Customized notifications assist you to set off notifications for the particular occasions that matter to you. These occasions will acknowledge Cybersecurity’s upcoming tiering performance.

For instance, moderately than being notified each time any vendor’s rating drops under a sure threshold, a set off for this occasion may be set for less than tier-1 distributors.

This function will empower you to deal with the occasions which can be most essential to your particular safety targets.

Prepared to save lots of time and streamline your belief administration course of?

What’s the Cyber Menace Panorama? | CybersecurityWhat’s the Cyber Menace Panorama? | Cybersecurity

Latest

What’s an Assault Vector? 16 Important Examples | Cybersecurity

In cybersecurity, an assault vector is a technique of...

Tips on how to Combine NDAs into the Vendor Danger Administration Course of | Cybersecurity

Through the Vendor Danger Administration course of, data is...

Making the Vendor Questionnaire Course of Extra Environment friendly in 2025 | Cybersecurity

Vendor safety questionnaires are irritating, each to the organizations...

Newsletter

Don't miss

Sure, It is Attainable to Full Vendor Questionnaires Sooner | Cybersecurity

Let's be sincere – no person likes safety questionnaires. To distributors, they're irritating workflow interruptions, at all times seeming to reach on the most...

What’s an Assault Vector? 16 Important Examples | Cybersecurity

In cybersecurity, an assault vector is a technique of attaining unauthorized community entry to launch a cyber assault. Assault vectors permit cybercriminals to take...

Tips on how to Combine NDAs into the Vendor Danger Administration Course of | Cybersecurity

Through the Vendor Danger Administration course of, data is in fixed flux. From threat assessments to threat remediation processes, communication involving delicate safety management...

LEAVE A REPLY

Please enter your comment!
Please enter your name here