Increasingly complex business partnerships and rising reliance on third-party software components are proving to be ever weakening cybersecurity links. https://lnkd.in/es2Pd-4j #risk #thirdpartyrisk #3rdParyRisk #cybersecurity #cybercrime #cyberwar #infosec
Anyone notice the paradox between Zero Trust prophets and Supply Chain doomsayers? Not to say that the two topics aren’t serious; they deserve the attention. On the one hand you have good advice: “assume breach” and that includes software and clouds. On the other hand, you are asking the CISO to fistulate the supply chain in pursuit of ‘trust’. And of course, this all goes out the window if you are dealing with an effective oligopoly (example, in the healthcare industry, you have effectively only 7 choices of payers you can submit HIPAA information to - it’s more like a supply wall and you HAVE to trust it). What have you, the data custodian, done today to sanction authorize use of the data and processes to domains and methods you inherently distrust? Provocative, Dave Hatter
Cybersecurity and Compliance Professional | Teacher | Speaker | Author | CISSP, CISA, CISM, CCSP, CSSLP, PMP, ITIL | Mayor | Opinions are mine; Post <> endorsement.
6d