Managing Third Party CyberRisks – Presentation Kit
A cyber compromise via third parties is an increasingly common attack vector.
In October 2016 Lifeblood was the victim of a damaging cyber attack. This attack led to Donors’ Personally Identifiable Information being leaked on the internet and accessible to everyone.
IBRS advisor Dr Philip Nesci investigated into the case study to determine what Lifeblood did in response to this cyber attack. In his presentation, he identified the key aspects of what went well and what could have been improved in terms of security measures for Lifeblood. Dr Phlip Nesci also discussed what can be done to survive these attacks without destroying your brand if this happens to you.
Trouble viewing this article?
A cyber compromise via third parties is an increasingly common attack vector.
Uncover the potential game-changing benefits of Cisco’s enhanced security and AI capabilities for enterprise network management and cybersecurity.
This paper sheds light on critical aspects of identity and access management such as justifying investments, controlling federated identities, and addressing certification fatigue.