Cybersecurity and Third-Party Risk: Third Party Threat Hunting
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM,...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hoboken, New Jersey
Wiley
[2021]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781119809555/?ar |
Zusammenfassung: | STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. The author discusses how to conduct due diligence on the third parties connected to your company's networks and how to keep your information about them current and reliable. You'll learn about the language you need to look for in a third-party data contract whether you're offshoring or outsourcing data security arrangements. Perfect for professionals and executives responsible for securing their organizations' systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to: Understand the fundamentals of third-party risk management Conduct robust intake and ongoing due diligence Perform on-site due diligence and close vendor risks Secure your software supply chain Utilize cloud and on-premises software securely Continuously monitor your third-party vendors and prevent breaches. |
Beschreibung: | Online resource; title from digital title page (viewed on July 30, 2021) |
Umfang: | 1 Online-Ressource |
ISBN: | 9781119809906 1119809908 9781119809562 1119809568 9781394176854 1394176856 9781119809555 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-067578713 | ||
003 | DE-627-1 | ||
005 | 20240228121353.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210811s2021 xx |||||o 00| ||eng c | ||
020 | |a 9781119809906 |c electronic book |9 978-1-119-80990-6 | ||
020 | |a 1119809908 |c electronic book |9 1-119-80990-8 | ||
020 | |a 9781119809562 |c electronic bk. |9 978-1-119-80956-2 | ||
020 | |a 1119809568 |c electronic bk. |9 1-119-80956-8 | ||
020 | |a 9781394176854 |c electronic bk. |9 978-1-394-17685-4 | ||
020 | |a 1394176856 |c electronic bk. |9 1-394-17685-6 | ||
020 | |a 9781119809555 |9 978-1-119-80955-5 | ||
035 | |a (DE-627-1)067578713 | ||
035 | |a (DE-599)KEP067578713 | ||
035 | |a (ORHE)9781119809555 | ||
035 | |a (DE-627-1)067578713 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a BUS |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Rasner, Gregory C. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cybersecurity and Third-Party Risk |b Third Party Threat Hunting |c Gregory C. Rasner |
264 | 1 | |a Hoboken, New Jersey |b Wiley |c [2021] | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource; title from digital title page (viewed on July 30, 2021) | ||
520 | |a STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. The author discusses how to conduct due diligence on the third parties connected to your company's networks and how to keep your information about them current and reliable. You'll learn about the language you need to look for in a third-party data contract whether you're offshoring or outsourcing data security arrangements. Perfect for professionals and executives responsible for securing their organizations' systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to: Understand the fundamentals of third-party risk management Conduct robust intake and ongoing due diligence Perform on-site due diligence and close vendor risks Secure your software supply chain Utilize cloud and on-premises software securely Continuously monitor your third-party vendors and prevent breaches. | ||
650 | 0 | |a Computer security | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Computer security | |
776 | 1 | |z 111980955X | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 111980955X |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119809555/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-067578713 |
---|---|
_version_ | 1821494832126754816 |
adam_text | |
any_adam_object | |
author | Rasner, Gregory C. |
author_facet | Rasner, Gregory C. |
author_role | aut |
author_sort | Rasner, Gregory C. |
author_variant | g c r gc gcr |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)067578713 (DE-599)KEP067578713 (ORHE)9781119809555 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03514cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-067578713</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121353.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">210811s2021 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119809906</subfield><subfield code="c">electronic book</subfield><subfield code="9">978-1-119-80990-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119809908</subfield><subfield code="c">electronic book</subfield><subfield code="9">1-119-80990-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119809562</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-80956-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119809568</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-80956-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781394176854</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-394-17685-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1394176856</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-394-17685-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119809555</subfield><subfield code="9">978-1-119-80955-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)067578713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP067578713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119809555</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)067578713</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rasner, Gregory C.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cybersecurity and Third-Party Risk</subfield><subfield code="b">Third Party Threat Hunting</subfield><subfield code="c">Gregory C. Rasner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, New Jersey</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on July 30, 2021)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. The author discusses how to conduct due diligence on the third parties connected to your company's networks and how to keep your information about them current and reliable. You'll learn about the language you need to look for in a third-party data contract whether you're offshoring or outsourcing data security arrangements. Perfect for professionals and executives responsible for securing their organizations' systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to: Understand the fundamentals of third-party risk management Conduct robust intake and ongoing due diligence Perform on-site due diligence and close vendor risks Secure your software supply chain Utilize cloud and on-premises software securely Continuously monitor your third-party vendors and prevent breaches.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">111980955X</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">111980955X</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119809555/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-067578713 |
illustrated | Not Illustrated |
indexdate | 2025-01-17T11:20:38Z |
institution | BVB |
isbn | 9781119809906 1119809908 9781119809562 1119809568 9781394176854 1394176856 9781119809555 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Wiley |
record_format | marc |
spelling | Rasner, Gregory C. VerfasserIn aut Cybersecurity and Third-Party Risk Third Party Threat Hunting Gregory C. Rasner Hoboken, New Jersey Wiley [2021] 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource; title from digital title page (viewed on July 30, 2021) STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN. Across the world, the networks of hundreds of different world-class organizations have been breached in a seemingly never-ending stream of attacks that targeted the trusted vendors of major brands. From Target to Equifax, Home Depot, and GM, it seems as if no company is safe from a third-party incident or breach, regardless of size. And the advanced threats are now exploiting the intersection of weaknesses in cybersecurity and third-party risk management. In Cybersecurity and Third-Party Risk, veteran cybersecurity specialist Gregory Rasner walks readers through how to lock down the vulnerabilities posed to an organization's network by third parties. You'll discover how to move beyond a simple checklist and create an active, effective, and continuous system of third-party cybersecurity risk mitigation. The author discusses how to conduct due diligence on the third parties connected to your company's networks and how to keep your information about them current and reliable. You'll learn about the language you need to look for in a third-party data contract whether you're offshoring or outsourcing data security arrangements. Perfect for professionals and executives responsible for securing their organizations' systems against external threats, Cybersecurity and Third-Party Risk is an indispensable resource for all business leaders who seek to: Understand the fundamentals of third-party risk management Conduct robust intake and ongoing due diligence Perform on-site due diligence and close vendor risks Secure your software supply chain Utilize cloud and on-premises software securely Continuously monitor your third-party vendors and prevent breaches. Computer security Computer Security Sécurité informatique 111980955X Erscheint auch als Druck-Ausgabe 111980955X |
spellingShingle | Rasner, Gregory C. Cybersecurity and Third-Party Risk Third Party Threat Hunting Computer security Computer Security Sécurité informatique |
title | Cybersecurity and Third-Party Risk Third Party Threat Hunting |
title_auth | Cybersecurity and Third-Party Risk Third Party Threat Hunting |
title_exact_search | Cybersecurity and Third-Party Risk Third Party Threat Hunting |
title_full | Cybersecurity and Third-Party Risk Third Party Threat Hunting Gregory C. Rasner |
title_fullStr | Cybersecurity and Third-Party Risk Third Party Threat Hunting Gregory C. Rasner |
title_full_unstemmed | Cybersecurity and Third-Party Risk Third Party Threat Hunting Gregory C. Rasner |
title_short | Cybersecurity and Third-Party Risk |
title_sort | cybersecurity and third party risk third party threat hunting |
title_sub | Third Party Threat Hunting |
topic | Computer security Computer Security Sécurité informatique |
topic_facet | Computer security Computer Security Sécurité informatique |
work_keys_str_mv | AT rasnergregoryc cybersecurityandthirdpartyriskthirdpartythreathunting |