overlay-image

CISO Hub

Cybersecurity research, insights and resources for the global CISO community

| Monthly Brief

Welcome to the CISO Hub. Learn about the implications of supply chain and third-party risk. 

Third-party risk is a top-of-mind concern for many CISOs, following the wave of supply chain attacks in the past couple of years. Supply chain compromises are not only difficult to prevent—considering that you have limited visibility into your partners’ security posture—but are also costlier than data breaches. While third-party risk is nothing new, there seems to be a growing trend of malicious actors weaponizing our trust in our partners. In the digital economy, every organization’s ecosystem of vendors and suppliers is a complex web of relationships, and threat actors have learned that exploiting weaknesses in this web could produce a greater return on investment.

It is also well-known in the security industry that the common processes organizations use to vet their partners’ security posture are inadequate. Unfortunately, our adversaries have also discovered these shortcomings and are taking full advantage while we think of ways to solve the problem. According to the 2023 predictions from our Resident CISO team, we should expect weaponization of trust to become a common practice.

One way that organizations are approaching supply chain risk mitigation is through vendor consolidation. This strategy can be effective, but you also must consider the implications, such as the risks of relying heavily on a small number of security vendors.

To explore this topic further, download our PowerPoint presentation that explores how to mitigate and manage supply-chain attacks throughout the trade lifecycle.

 

Insights Resource of the Month
Mitigating and managing supply-chain attacks throughout the trade lifecycle

Download this PowerPoint presentation that explores how to mitigate and manage supply-chain attacks throughout the trade lifecycle.

Download here

Content From Our Team

E-book
Metrics that Matter

The modern CISO’s guide to assessing, prioritizing, and justifying cybersecurity budgets that make business sense.

Magazine
New Perimeters Magazine

The newest edition gives you insights into protecting your people to fight systemic risk.

Podcast Series
CISO Voices

In this series, meet six CISOs who discuss how their role is changing, the leadership needed to succeed and what the future holds for CISOs.

Research

REPORTS
White Paper
Cybersecurity: The 2022 Board Perspective Report

New insights from board members reveal how they view cybersecurity priorities and CISO relationships.

REPORTS
White Paper
2022 Voice of the CISO

First-hand insights and predictions of 1,400 CISOs from around the world.

Meet Our CISOs

Our resident CISOs drive our people-centric security vision with their hands-on experience and perspective in managing risk and improving cybersecurity posture across complex enterprises.

In order for your best practices to be effective, you need to make sure that you integrate them into your risk assessment process at an enterprise level.

Dr. Deborah Watson Resident CISO

Lucia Milică Stacy

VP & Global Resident CISO

Follow:

Ryan Witt

Healthcare and SLED

Follow:

John Checco

FinServ

Follow:

Andrew Rose

EMEA

Follow:

Deborah Watson

Americas

Follow:

Yvette Lejins

APAC

Follow:

Dennis Dayman

Americas

Follow:

Bert Skaletski

EMEA

Follow:

Ask the CISO