• CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Resources
    • Blog
    • Strategy Guides
    • Case Studies
    • Data Sheets
    • Webinars
    • API
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Resources
    • Blog
    • Strategy Guides
    • Case Studies
    • Data Sheets
    • Webinars
    • API
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Resources
    • Blog
    • Strategy Guides
    • Case Studies
    • Data Sheets
    • Webinars
    • API
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Resources
    • Blog
    • Strategy Guides
    • Case Studies
    • Data Sheets
    • Webinars
    • API
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • Products
  • TPRM by ThirdPartyTrust
  • Beacon by ThirdPartyTrust
  • Solutions
  • Risk Assessment Automation
  • Security Questionnaire Automation
  • Shadow IT Management
  • Zero Day Remediation
  • Integrations
  • Industries
    • Financial
    • Energy
    • Healthcare and Hospitals
    • Legal
    • Life Sciences
    • Manufacturing Industry
    • Retail
    • Technology
    • Other Industries
  • Pricing
  • Resources
  • Blog
  • Strategy Guides
  • Case Studies
  • Data Sheets
  • Webinars
  • Dictionary
  • API
  • Company
  • About us
  • Careers
  • Partners
  • Partners Login
  • Product Security
  • Privacy Policy

CAMP IT Data Breach Discussion: Impact on Security/Risk Strategy

Published by Guest Writer on June 28, 2017
Categories
  • Blog
Tags
  • Cybersecurity
CAMP IT Data Breach Discussion Impact on SecurityRisk Strategy

At the CAMP IT Chicago Panel Discussion, Anders Norremo of ThirdPartyTrust moderated a panel of IT executives to address these recent attacks, analyze trends in cyber security, and to instruct attendees on how to best update their own security and risk strategies. IT executives participating on the panel included Fred Kwong, CISO of Delta Dental Plans Association; Jason Ruger, Chief Security Officer of Motorola; and James Mountain, the Director of Information Security at Palmer College.

Over the past year, cyberattacks have infiltrated hundreds of thousands of security systems, devastating government and infrastructure in more than 150 countries—including Spain’s telecommunications, Britain’s hospital system and Germany’s railways.

Organization’s in the private sector aren’t left unscathed, as several Fortune 500 companies have experienced data breaches as well, such as FedEx and Nissan. Following the series of high profile attacks, organizations have become increasingly conscious of their own vulnerabilities.

Government leaders and company executives are eagerly pushing initiatives to improve and update their own security measures against cyber threats including the U.S. White House. Industry analysts asses that approximately 50% of organizations have had to re-evaluate their information security standards as a result of recent well-publicized data breaches. 

The panel explored the implications of specific, high profile data breaches on their organizations. For example, Norremo asked executives to explain the extent that WannaCry pushed their organizations to patch its servers, how many servers needed to be patched and restarted, and what challenges the company confronted in the process.

Additionally, IT executives discussed how the Ongoing Vault 7 NSA toolkit release by WikiLeaks affected their risky strategies. Lastly on this this topic, the panel examined how these high-profile breaches affected their security budget.

The conference analyzed the current nature of security threats and cyberattacks. Panel members shared what they perceived as the biggest threat to their organization. IT executives debated whether the greatest security concern stemmed from a breach within the organization, or rather one originating from a third-party-vendor. Moreover, the panel explored how the frequency and complexity of cyberattacks have changed over time. 

The panel concluded the conference by providing direct suggestions to CAMP IT attendees. Anders Norremo asked panel members to inform the audience on the most effective methods for improving security systems. Moreover, the panel discussed means to educate non-security executives on cyberattacks and the importance of risk strategy.

As cyberattacks continue to become increasingly complex and pervasive, it is critical that organizations, both in the public and private sphere, prioritize and improve their risk and security strategies. Measures such as CAMP IT, which sought to educate attendees on the importance of data security, represents a step in the right direction.

 


 

To learn more about how ThirdPartyTrust can help you manage third-party risk, request your free trial now:

 

Trial Account Sign-Up
Guest Writer
Guest Writer
    • Phone
      |+1-617-245-0469
    • Address
      |
      111 Huntington Ave, Suite 2010, Boston, MA 02199
    • Sales
      |sales@bitsighttech.com
    • Contact Us
    Laika_SOC2_TypeI_PurpleIris        CSA_Trusted_Cloud_Provider

    ©2022 ThirdPartyTrust, LLC and its Affiliates. All Rights Reserved. | 111 Huntington Ave. Suite 2010 Boston, MA 02199
    • BLOG
    • PARTNERS LOGIN
    • CONTACT US
    • PRIVACY POLICY
    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Reject AllAccept
    Cookie Settings
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT