Turning the tide on third-party risk

Using threat intelligence to mitigate against security breaches

Webinar There are some unhappy projections out there about the prevalence of third-party security breaches.

These breaches occur when sensitive data is stolen from a third-party vendor or when their systems are used to access and steal sensitive information stored on your systems. Likely to be under-reported, it is thought that 29 percent of all incursions have come about through a third party for example.

Your threat intelligence platform is likely in already in place and is very good at providing all kinds of detail about all kinds of attacks. But how hot is it on the risk from third-party partners and systems?

Join our Regcast on 18 April at 3pm BST/10 am EDT/7am PDT to get more tips from Andy Grayland, CISO at Silobreaker on how threat intelligence can be used to minimize and manage potential third party risks to both your own and your partners' organizations.

Identifying and mitigating third-party risk is often an area of high-level concern for security teams that need to consider what data to collect and how to correlate it with internal information sources. It's Silobreaker's business to provide real-time insights on emerging risks, so who better to offer advice?

Sign up to watch the webinar here and we'll send you a reminder when it's time to log on.

Sponsored by Silobreaker.

More about


Send us news