3rd Party Risk Management

Creating New Efficiencies in Vendor Risk Management

Stephen Boyer of BitSight Technologies on Rethinking Strategies

As third-party vendor relationships become more complex and dynamic, organizations need to rethink the way they approach their vendor risk management strategies, says Stephen Boyer of Bitsight.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In a video interview at RSA Conference 2017, Boyer also discusses:

  • Drawbacks of conventional vendor risk management strategies;
  • Ways that organizations can make their VRM programs more effective and efficient;
  • Why organizations need to make security performance monitoring a higher priority.

Boyer is the CTO, co-founder and a board member at BitSight Technologies. Previously, he has worked at Saperix, Lincoln Lab and Caldera.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.