Filter the library by ...

white paper | Presented by Bitsight

A CIO's Guide for Reducing Security Anxiety

In this guide, we'll walk through the following: Why cybersecurity bench marking is difficult for the modern CIO, different methods of bench marking you may be involved in (or want to consider), how Security Ratings may solve many bench marking challenges. Download this free guide today so you can establish your bench marking plan

eguide | Presented by Bitsight

Board-Level Reporting Survival Guide

This Survival Guide offers some advice on how to advance the CSO/CISO-board relationship, and provides some tips that CSO/ CISOs can use to make their seat at the table more secure-and more meaningful to the business.

ebook | Presented by Bitsight

Creating Efficiencies In Vendor Risk Management

Today, organizations are focused heavily on core competencies and keys to success. This - coupled with the rapid growth of software as a service (SaaS) - has led to increased outsourcing of certain business functions to vendors who can perform these functions better, faster, or cheaper. Therefore, there are more third-party relationships today than ever before - and this comes with a variety of benefits and consequences.

white paper | Presented by Bitsight

Cybersecurity: The New Metrics

"How secure are we?" That's one of the most common questions asked by boards and senior managers. But security and technology leaders do not always have ready answers, says Jacob Olcott of BitSight Technologies. Are they even using the right security metrics?

white paper | Presented by Bitsight

GDPR and the Regulatory Impact on Vendor

GDPR and other global cyber security regulations - what's the impact on vendor risk management? Tom Field, VP of Editorial at Security Media Group discusses the topic with Jacob Olcott from Bitsight Technologies.

white paper | Presented by Bitsight

GDPR and Vendor Risk Management

As the GDPR enforcement date edges closer, organizations remain unprepared to comply, especially when it comes to vendor risk management. What - beyond contracts - do organizations need?

white paper | Presented by Bitsight

Global Financial Firm Reduces Risk of Third Party Breach with Bitsight Security Ratings

A leader in commercial banking, this global financial services firm is no stranger to security risk. Recognized as an early adopter of risk management and security best practices for their industry, they were confident that their own security risk was being vigilantly managed. However, avoiding breach through a third party was an area of significant concern.

viewpoint | Presented by Bitsight

How to Strengthen Your Vendor Risk Management Strategy Through Automation

To reduce third-party cyber risk and protect company data as it leaves the corporate network, organizations need processes and solutions that leverage automation, allowing security and risk managers to focus on the most imminent risks. STEPHEN BOYER, CTO of BitSight, explains how organizations can incorporate automation to develop more mature vendor risk management programs.

case study | Presented by Bitsight

Large Telecommunications Company Leverages Bitsight Security Ratings to Report Security Effectiveness to the Board of Directors

BitSight Security Ratings for Benchmarking & Forensics delivers independent, data-driven analysis of any organization's security effectiveness. Unlike time-consuming and expensive network scans or penetration tests, BitSight's SaaS offering continuously analyzes, rates, and observes companies' security postures, all from outside the network.

white paper | Presented by Relativity

Relativity Trust: Understanding Security in RelativityOne

Security is integral to who we are at Relativity-from our people and operations, to how we design RelativityOne and the foundation we build on in Microsoft Azure. Our commitment to make RelativityOne the most trusted and reliable cloud solution extends beyond ISO 27001 compliance. These are the tenets of Relativity Trust. Download this white paper for the details, from hiring practices to password policies to penetration tests.

Load More