sb-au logo
Story image

BitSight enhances fourth-party risk management solution

19 Dec 2019

Security ratings solutions provider BitSight has introduced enhancements to its fourth-party risk management solution to provide deeper customer visibility into their extended business ecosystems.

The company explains that as organisations’ vendor and fourth-party ecosystems continue to expand, so does their risk surface; however, lack of visibility into that ecosystem and the cyber risk within it makes it difficult for them to understand and effectively manage that risk.

Despite new regulatory requirements, security and risk leaders are challenged to provide measurable updates and confidence to executives and board members about their fourth-party risk management and operational resiliency plans, BitSight continues.

BitSight for Fourth-Party enables customers to identify areas of business and cyber risk. It does this by automatically pinpointing connections between any organisation, its business partners, and potentially risky fourth parties.

Updates to the solution include expanded observable fourth-party datasets, including an enhanced user experience and 80 categories of technology service providers (e.g. hosting, DNS, CDN, security, expense management) and more than 11,000 technology products such as Amazon Web Services, Microsoft Azure, Dyn DNS, and Microsoft Office 365.

“Outages, disruptions and compromises affecting fourth-party service providers are becoming an increasing threat, while regulatory pressure on organisations to get a better handle on fourth-party risk continues to mount,” says BitSight’s vice president of product management, Vineet Seth.

“BitSight for Fourth-Party Risk Management equips organisations with the needed visibility to better evaluate and select vendors, identify common dependencies in order to triage and prioritise outreach to vendors, and continuously monitor fourth- and nth-parties to better manage cyber risk across the extended business ecosystem.”

BitSight states that the solution can offer the following information:

  • Improve visibility across their extended business ecosystem:
    • Identify connections across their extended ecosystem;
    • Continuously monitor and be alerted to newly uncovered and ended relationships;
    • Validate vendor assessment and questionnaire responses; and
    • Receive alerts when new relationships are developed that could pose risk.
       
  • Pinpoint concentration risk and achieve a higher level of business resilience:
    • Quickly identify and highlight risky business connections;
    • Explore and understand service provider dependencies for disaster recovery planning;
    • Know which products and vendors have the greatest potential for impacting an organisation’s level of risk;
    • Gain insights for disaster recovery planning, including downstream impact assessments, and streamline their breach response; and
    • Understand location risk by pinpointing services in the supply chain of specific regions.
       
  • Communicate effectively to internal and external stakeholders:
    • Generate dynamic reports to communicate oversight and governance to executives, board members, regulators, auditors and insurers; and
    • Leverage an intuitive, user-friendly dashboard with reports that instantly depict relationships between third- and fourth parties.
Story image
Exabeam and Code42 partner up to launch insider threat solution
The solution will give customers a fuller picture of their environment, and will leverage automated incident response to obstruct insider threat before data loss occurs.More
Story image
Ripple20 threat has potential for 'vast exploitation', ExtraHop researchers find
One in three IT environments are vulnerable to a cyber threat known as Ripple20. This is according to a new report from ExtraHop, a cloud-native network detection and response solutions provider. More
Story image
Fortinet’s ‘zero trust’ approach redefining security
Cornelius Mare, Fortinet A/NZ Director, Security Solutions, explains why taking a ‘zero trust network access’ approach to cybersecurity requires fully-integrated and comprehensive security services and policies.More
Story image
Report: 151% increase in DDoS attacks compared to 2019
It comes as the security risk profile for organisations around the world increased in large part thanks to the COVID-19 pandemic, forcing greater reliance on cloud technology and thrusting digital laggards into quick and unsecured migrations.More
Download image
Network functions virtualisation: What is is, how to use it, and why it matters
Network functions virtualisation (NFV) is fast becoming the go-to method of simplifying corporate networks from planning, through deployment and management.More
Story image
Proofpoint enhances security awareness training platform
Available in Q4 2020, the platform will integrate more closely with Proofpoint’s best-in-class threat intelligence.More