Remove Cyber Resilience Remove Financial Services Remove Malware Remove Risk Management
article thumbnail

Supply Chain Resiliency: Beyond Third-Party Risk Programs

FS-ISAC

We spoke with MassMutual CISO Ariel Weintraub about how firms need to go beyond third-party risk management to focus on supply chain resiliency, and the different thinking required to effectively build it. Third-party risk programs can assess the cyber resiliency of each key supplier, but that is not enough.

article thumbnail

From Emerging Trends to Cyber Risks: a Latin American Perspective

FS-ISAC

In terms of cyber maturity, Latin America still needs significant advances. The recent OECD study, Digital Security Risk Management , highlights that only three of the 21 countries in Latin America have a defined national digital security strategy, indicating that the region is not yet sufficiently prepared.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data Privacy Week 2024: The Definitive Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.

article thumbnail

Data Privacy Awareness Month 2024: Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.

article thumbnail

Data Privacy Day 2024: The Definitive Roundup of Expert Quotes

Solutions Review

This is likely to impact industries where transparency matters, such as healthcare, financial services, and insurance. And when a phishing attack succeeds, the cybercriminals capture private data, personal information, company data, or they may even install malware directly onto the device to facilitate ongoing attacks.