SlideShare a Scribd company logo
_________________
#hacksandhops
• Please remember to silence your phone
• Post using #hacksandhops, and check out the Snapchat filter
• You can download this presentation at the end
Several notes:
WELCOME!
DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS
#hacksandhops
THANKS TO OUR SPONSORS
DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS
#hacksandhops
Founder& CEO,FRSecure
• Founder of FRSecure ® and SecurityStudio®
• Co-inventor of FISASCORE® andVENDEFENSE®
• Author of UNSECURITY
• 25+ years of “practical” information security experience
• Advised legal counsel in very public breaches (Target, Blue Cross/Blue
Shield, etc.)
• Member of the Forbes Technology Council
• Written more than 750 articles about information security,
dozens of television and radio appearances
EVAN FRANCEN
KEYNOTE
#hacksandhops
#hacksandhops
BEFORE WEGO MUCH FURTHER…
Why should you care about your vendors?
#hacksandhops
VENDORS ARE A SECURITY RISK
Don’t believe me?
_______
#hacksandhops
• Only 35% of enterprise security professionals are very confident in
knowing the actual number of vendors accessing their systems.
• Only 52% of companies have security standards for third-parties.
• Just 34% know the number of individual log-ins that can be attributed to
vendors.
• 69% of respondents say they definitely or possibly suffered a security
breach resulting from vendor access within the last year.
• On average, organizations spent $10 million responding to third-party
breaches over a 12-month period in 2016.
• 63% of all cyber attacks could be traced either directly or indirectly
to third parties.
Sources: Bomgar survey, PwC, Soha Systems, CSO Online
FOUR APPROACHES TO VRM
Where do you fall?
#hacksandhops
FOUR CATEGORIES OF
ORGANIZATIONS
Common issues:
• Several people having to work on VRM
• Knowing who all your vendors are
• Categorizing 'high risk’ vendors
• Gathering accurate vendor information
• Tracking and acting on results
• Keeping up with scheduling
_______
#hacksandhops
GOOD
PARTIAL
PAINFUL
NONE
Doing VRM using an
internal process that is working
Doing VRM but using spreadsheets
or some other messy solution
Not doing VRM but know
they should
Not doing VRM but
don’t think they need to
WHERE DO YOU FALL?
NONE
Several reasons, including:
• You just didn’t/don’t know any better.
• You don’t know where to start.
• You’ve tried before and gave up due to
complexity or shifting priorities.
• You don’t see the value in establishing
a good third-party information security
risk management program.
• You don’t have the time or money
• Executive Leadership do not feel it is
a priority
• Other?
_______
#hacksandhops
GOOD
PARTIAL
PAINFUL
NONE
PAINFUL
• Trying to do VRM, but it’s painful
• Want to do the right thing.
• Forced to do it.
• Usually manual, difficult to manage,
disruptive and subjective
• Overall ineffective at managing risk and
defensibility is variable.
• The painful approach is expensive
and a waste of valuable resources.
#hacksandhops
GOOD
PARTIAL
PAINFUL
NONE
WHERE DO YOU FALL?
_______
PARTIAL
• Only covers part of “information security”
• Information security is managing risk to
information confidentiality, integrity, and
availability considering administrative,
physical, and technical controls.
• Typically focused on technical controls because
they’re easy; however, aren’t people the
greatest risk?
• Good at partial, but not likely to address
how breaches will occur; partially
defensible.
• The partial approach is incomplete
and leads to a false sense of security
(sometime worse than no security
at all).
#hacksandhops
GOOD
PARTIAL
PAINFUL
NONE
WHERE DO YOU FALL?
_______
GOOD
• Rare, but effective and streamlined.
• Doesn’t compromise on our definition of
“information security”.
• Simplified – no unnecessary steps; easy-to-
follow.
• Standardized – objective, same processes
for all third-parties.
• Defensible – logical, organized,
objective, auditable and completely
effective.
#hacksandhops
GOOD
PARTIAL
PAINFUL
NONE
WHERE DO YOU FALL?
_______
STANDARDIZE
One-Offs Hurt
#hacksandhops
STANDARDIZE
• Once we’ve established the standard process,
don’t deviate unless it’s absolutely necessary.
_______
#hacksandhops
• If deviations from the standard
process must be done, make sure
they’re documented and signed off on.
• Each deviation from the standard
process erodes defensibility.
STANDARDIZE
• Big vendors (Microsoft, Google, Amazon, etc.) may not
participate in our VRM process; these are common
deviations
and are exceptions that can easily be
explained
away should something bad happen.
_______
#hacksandhops
• Standardization comes through
documentation, training, and
automation. Every step in the process
that can be
automated should be automated.
DEFENSIBLE
The True Motivator
#hacksandhops
THE TRUE MOTIVATION:
DEFENSIBILITY
• Defensibility in your VRM is arguably the
most significant “why” for doing it in the
first place.
• If/when something bad happens, attackers
become customers, regulators, opposing
counsel, etc.
_______
#hacksandhops
THE TRUE MOTIVATION:
DEFENSIBILITY
• Ask yourself about defensibility constantly
during VRM activities.
Examples:
• How many vendors do we have? Defensible?
• How many high-risk vendors do we have? Defensible?
• Have you vetted all high-risk vendors? Defensible?
• Non-definitive answers (assumptions,
guesses, etc.) are more likely to be
indefensible.
_______
#hacksandhops
PANELISTS
_______
#hacksandhops
Vice President & CISO,Provation
• BIO INFORMATION
MILINDA RAMBEL-STONE
PANELISTS
#hacksandhops
TODDTHORSEN, CISSP, CISM,CIPP/US
PANELISTS
#hacksandhops
Senior ManagerInformationSecurity, RiskManagement&
Compliance,Code42
• BIO INFORMMATION
ARIN BROWN
PANELISTS
#hacksandhops
ChiefTechnologyOfficer, SeaChange
• BIO INFORMATION
PANEL DISCUSSION
_______
#hacksandhops
QUESTIONS?_______
#hacksandhops
NEXT HACKS& HOPS
PLACEHOLDER
_______
#hacksandhops
• STATS FOR NEXT H&H OR OTHER INFORMATION
PLACEHOLDERFOR NEXTH&H
NEXT HACKS & HOPS
AMBUSHED!INSIDETHE MINDOF A HACKER
#hacksandhops
WANT THIS PRESENTATION?
Text DEFEND19to 555888to get acopyofthis slidedeck.
________
#hacksandhops
THANK YOU!
_______
#hacksandhops
• Last call at 4:40; head downstairs by 5
• Share your opinion with Andy
• Keep posting using #hacksandhops to appear on our social wall
Several notes:
THANK YOU!
DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS
#hacksandhops

More Related Content

PPTX
ToT17 UK: When Things Go Wrong - Dave Wilson, Hollywood Bowl
PPTX
IT Automation: You're doing it Wrong
PDF
It Automation: Doing it Wrong - Mykel Alvis
PDF
The Urgent/Important Matrix: A brief description
PPTX
Game producer 101
PDF
5 Signs Your Business Is Suffering Because You Haven't Documented Your Busine...
PPSX
A Study of Innovation by Phil Wheat
PPTX
SpeechTEK University Outtakes 2014: Zero Out Strategies
ToT17 UK: When Things Go Wrong - Dave Wilson, Hollywood Bowl
IT Automation: You're doing it Wrong
It Automation: Doing it Wrong - Mykel Alvis
The Urgent/Important Matrix: A brief description
Game producer 101
5 Signs Your Business Is Suffering Because You Haven't Documented Your Busine...
A Study of Innovation by Phil Wheat
SpeechTEK University Outtakes 2014: Zero Out Strategies

Similar to Step Up Your Data Security Against Third-Party Risks (20)

PPTX
Managing Third-Party Risk Effectively
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Ivanti Threat Thursday for January 23
PPTX
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Privacy & Security Controls In Vendor Management Al Raymond
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PPTX
Secure Iowa Oct 2016
PPTX
Fit for Service - A strategy for service organizations.
PPTX
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
PPTX
Identifying Your Agency's Vulnerabilities
PPTX
5 Steps to an Effective Vulnerability Management Program
PPTX
Supply Chain and Third-Party Risks During COVID-19
PDF
Outpost24 webinar - risk based vulnerability management - what's in a risk score
PDF
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
PPT
Ignorance Is Risk
PPTX
Vulnerability_Management.pptx
PDF
Building an effective Information Security Roadmap
PDF
Vulnerability Management Whitepaper PowerPoint Presentation Slides
PPTX
Vendor Management for PCI DSS, HIPAA, and FFIEC
Managing Third-Party Risk Effectively
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Ivanti Threat Thursday for January 23
Vendor Management - PCI DSS, ISO 27001, E13PA,HIPPA & FFIEC
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Privacy & Security Controls In Vendor Management Al Raymond
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Secure Iowa Oct 2016
Fit for Service - A strategy for service organizations.
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...
Identifying Your Agency's Vulnerabilities
5 Steps to an Effective Vulnerability Management Program
Supply Chain and Third-Party Risks During COVID-19
Outpost24 webinar - risk based vulnerability management - what's in a risk score
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
Ignorance Is Risk
Vulnerability_Management.pptx
Building an effective Information Security Roadmap
Vulnerability Management Whitepaper PowerPoint Presentation Slides
Vendor Management for PCI DSS, HIPAA, and FFIEC
Ad

More from Evan Francen (20)

PPTX
WANTED - People Committed to Solving Our Information Security Language Problem
PPTX
Keynote @ ISC2 Cyber Aware Dallas
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PPTX
Harrisburg BSides Presentation - 100219
PPTX
Information Security & Manufacturing
PPTX
Simple Training for Information Security and Payment Fraud
PPTX
MHTA Social Engineering Presentation - 050917
PPTX
People. The Social Engineer's Dream - TechPulse 2017
PPTX
AFCOM - Information Security State of the Union
PPTX
Managing Risk or Reacting to Compliance
PPTX
TIES 2013 Education Technology Conference
PPTX
Mobile Information Security
PPTX
Information security challenges in today’s banking environment
PPTX
Information Security in a Compliance World
PPTX
Information Security For Leaders, By a Leader
PPTX
Information Security is NOT an IT Issue
PPTX
People are the biggest risk
PPTX
FRSecure's Ten Security Principles to Live (or die) By
PPTX
Meaningful Use and Security Risk Analysis
PPTX
An Introduction to Information Security
WANTED - People Committed to Solving Our Information Security Language Problem
Keynote @ ISC2 Cyber Aware Dallas
WANTED – People Committed to Solving our Information Security Language Problem
Harrisburg BSides Presentation - 100219
Information Security & Manufacturing
Simple Training for Information Security and Payment Fraud
MHTA Social Engineering Presentation - 050917
People. The Social Engineer's Dream - TechPulse 2017
AFCOM - Information Security State of the Union
Managing Risk or Reacting to Compliance
TIES 2013 Education Technology Conference
Mobile Information Security
Information security challenges in today’s banking environment
Information Security in a Compliance World
Information Security For Leaders, By a Leader
Information Security is NOT an IT Issue
People are the biggest risk
FRSecure's Ten Security Principles to Live (or die) By
Meaningful Use and Security Risk Analysis
An Introduction to Information Security
Ad

Recently uploaded (20)

PDF
Reconciliation AND MEMORANDUM RECONCILATION
PPTX
HR Introduction Slide (1).pptx on hr intro
PDF
Ôn tập tiếng anh trong kinh doanh nâng cao
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
PDF
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
PPTX
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
PPTX
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
PPTX
5 Stages of group development guide.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
DMT - Profile Brief About Business .pptx
PDF
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
PDF
Roadmap Map-digital Banking feature MB,IB,AB
PPT
Data mining for business intelligence ch04 sharda
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PDF
Unit 1 Cost Accounting - Cost sheet
DOCX
Business Management - unit 1 and 2
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
PDF
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
PDF
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034
Reconciliation AND MEMORANDUM RECONCILATION
HR Introduction Slide (1).pptx on hr intro
Ôn tập tiếng anh trong kinh doanh nâng cao
Belch_12e_PPT_Ch18_Accessible_university.pptx
pdfcoffee.com-opt-b1plus-sb-answers.pdfvi
Dr. Enrique Segura Ense Group - A Self-Made Entrepreneur And Executive
job Avenue by vinith.pptxvnbvnvnvbnvbnbmnbmbh
The Marketing Journey - Tracey Phillips - Marketing Matters 7-2025.pptx
5 Stages of group development guide.pptx
COST SHEET- Tender and Quotation unit 2.pdf
DMT - Profile Brief About Business .pptx
Leading with Vision_ How Mohit Bansal Is Shaping Chandigarh’s Real Estate Ren...
Roadmap Map-digital Banking feature MB,IB,AB
Data mining for business intelligence ch04 sharda
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Unit 1 Cost Accounting - Cost sheet
Business Management - unit 1 and 2
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
Traveri Digital Marketing Seminar 2025 by Corey and Jessica Perlman
Stem Cell Market Report | Trends, Growth & Forecast 2025-2034

Step Up Your Data Security Against Third-Party Risks

  • 2. • Please remember to silence your phone • Post using #hacksandhops, and check out the Snapchat filter • You can download this presentation at the end Several notes: WELCOME! DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS #hacksandhops
  • 3. THANKS TO OUR SPONSORS DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS #hacksandhops
  • 4. Founder& CEO,FRSecure • Founder of FRSecure ® and SecurityStudio® • Co-inventor of FISASCORE® andVENDEFENSE® • Author of UNSECURITY • 25+ years of “practical” information security experience • Advised legal counsel in very public breaches (Target, Blue Cross/Blue Shield, etc.) • Member of the Forbes Technology Council • Written more than 750 articles about information security, dozens of television and radio appearances EVAN FRANCEN KEYNOTE #hacksandhops
  • 6. BEFORE WEGO MUCH FURTHER… Why should you care about your vendors? #hacksandhops
  • 7. VENDORS ARE A SECURITY RISK Don’t believe me? _______ #hacksandhops • Only 35% of enterprise security professionals are very confident in knowing the actual number of vendors accessing their systems. • Only 52% of companies have security standards for third-parties. • Just 34% know the number of individual log-ins that can be attributed to vendors. • 69% of respondents say they definitely or possibly suffered a security breach resulting from vendor access within the last year. • On average, organizations spent $10 million responding to third-party breaches over a 12-month period in 2016. • 63% of all cyber attacks could be traced either directly or indirectly to third parties. Sources: Bomgar survey, PwC, Soha Systems, CSO Online
  • 8. FOUR APPROACHES TO VRM Where do you fall? #hacksandhops
  • 9. FOUR CATEGORIES OF ORGANIZATIONS Common issues: • Several people having to work on VRM • Knowing who all your vendors are • Categorizing 'high risk’ vendors • Gathering accurate vendor information • Tracking and acting on results • Keeping up with scheduling _______ #hacksandhops GOOD PARTIAL PAINFUL NONE Doing VRM using an internal process that is working Doing VRM but using spreadsheets or some other messy solution Not doing VRM but know they should Not doing VRM but don’t think they need to
  • 10. WHERE DO YOU FALL? NONE Several reasons, including: • You just didn’t/don’t know any better. • You don’t know where to start. • You’ve tried before and gave up due to complexity or shifting priorities. • You don’t see the value in establishing a good third-party information security risk management program. • You don’t have the time or money • Executive Leadership do not feel it is a priority • Other? _______ #hacksandhops GOOD PARTIAL PAINFUL NONE
  • 11. PAINFUL • Trying to do VRM, but it’s painful • Want to do the right thing. • Forced to do it. • Usually manual, difficult to manage, disruptive and subjective • Overall ineffective at managing risk and defensibility is variable. • The painful approach is expensive and a waste of valuable resources. #hacksandhops GOOD PARTIAL PAINFUL NONE WHERE DO YOU FALL? _______
  • 12. PARTIAL • Only covers part of “information security” • Information security is managing risk to information confidentiality, integrity, and availability considering administrative, physical, and technical controls. • Typically focused on technical controls because they’re easy; however, aren’t people the greatest risk? • Good at partial, but not likely to address how breaches will occur; partially defensible. • The partial approach is incomplete and leads to a false sense of security (sometime worse than no security at all). #hacksandhops GOOD PARTIAL PAINFUL NONE WHERE DO YOU FALL? _______
  • 13. GOOD • Rare, but effective and streamlined. • Doesn’t compromise on our definition of “information security”. • Simplified – no unnecessary steps; easy-to- follow. • Standardized – objective, same processes for all third-parties. • Defensible – logical, organized, objective, auditable and completely effective. #hacksandhops GOOD PARTIAL PAINFUL NONE WHERE DO YOU FALL? _______
  • 15. STANDARDIZE • Once we’ve established the standard process, don’t deviate unless it’s absolutely necessary. _______ #hacksandhops • If deviations from the standard process must be done, make sure they’re documented and signed off on. • Each deviation from the standard process erodes defensibility.
  • 16. STANDARDIZE • Big vendors (Microsoft, Google, Amazon, etc.) may not participate in our VRM process; these are common deviations and are exceptions that can easily be explained away should something bad happen. _______ #hacksandhops • Standardization comes through documentation, training, and automation. Every step in the process that can be automated should be automated.
  • 18. THE TRUE MOTIVATION: DEFENSIBILITY • Defensibility in your VRM is arguably the most significant “why” for doing it in the first place. • If/when something bad happens, attackers become customers, regulators, opposing counsel, etc. _______ #hacksandhops
  • 19. THE TRUE MOTIVATION: DEFENSIBILITY • Ask yourself about defensibility constantly during VRM activities. Examples: • How many vendors do we have? Defensible? • How many high-risk vendors do we have? Defensible? • Have you vetted all high-risk vendors? Defensible? • Non-definitive answers (assumptions, guesses, etc.) are more likely to be indefensible. _______ #hacksandhops
  • 21. Vice President & CISO,Provation • BIO INFORMATION MILINDA RAMBEL-STONE PANELISTS #hacksandhops
  • 22. TODDTHORSEN, CISSP, CISM,CIPP/US PANELISTS #hacksandhops Senior ManagerInformationSecurity, RiskManagement& Compliance,Code42 • BIO INFORMMATION
  • 27. • STATS FOR NEXT H&H OR OTHER INFORMATION PLACEHOLDERFOR NEXTH&H NEXT HACKS & HOPS AMBUSHED!INSIDETHE MINDOF A HACKER #hacksandhops
  • 28. WANT THIS PRESENTATION? Text DEFEND19to 555888to get acopyofthis slidedeck. ________ #hacksandhops
  • 30. • Last call at 4:40; head downstairs by 5 • Share your opinion with Andy • Keep posting using #hacksandhops to appear on our social wall Several notes: THANK YOU! DEFEND!STEP UPYOUR DATA SECURITY DEFENSESAGAINST THIRD-PARTY RISKS #hacksandhops