onShore Security

Because Security Gives Us Freedom.

  • Managed Security
    • Panoptic Cyberdefense
      • Panoptic Cyberdefense Overview
        • Cybersecurity in Banking
      • Managed Detection and Response
      • MDR + NDR
      • Security Orchestration
      • The Panoptic Approach
    • Cybersecurity Leadership
      • Cybersecurity Leadership
      • Continuous Vulnerability Management
      • Security Assessments
        • Security Assessments
        • Security Maturity Assessment
    • Managed Security Solutions
      • Managed Security Solutions
      • Panoptic Sensor
      • Managed Firewall
      • Managed EDR
  • Resources
    • Articles
      • Detection is your Superpower
      • Why We Win
    • Blog Posts
    • onSecurity Podcast
    • News
    • Videos
  • About Us
    • Why We Win
    • Our Mission
    • Our Clients
    • Leadership Team
    • Community
    • onShore Security Jobs
    • Press
  • Contact

Third-Party Vendor Security Risks & NIST: onShore Video

April 24, 2017 By Josh Eklow

Deb Stonikas asks about security and third party vendors

Deb Stonikas: Last week’s headline news: ScottTrade data breach exposes 20,000 customer accounts. Their response? 20,000 customer accounts were exposed when a Third Party vendor uploaded a file to a server without proper security protocols. I guess this is just another example of how third party vendors never make headline news. But more importantly, what I want to talk about today is the NIST framework. In January of 2017, the NIST framework was updated to include supply chain risk management for security. Can you elaborate on those updates and tell us what’s happening now?

Steve Kent: So, yes, NIST updated their guidelines to include more supply chair vendor management than it previously had. The guidelines were previously there and had been there since ISO 27000-02. Those guidelines include any data handling within vendors or suppliers or even third parties working with the organization. Everything from HRM or HR outsourcing companies to healthcare providers, even as far as security guards and cleaning crew. Anyone that may have access to either sensitive data or have access to equipment in which that data may be located. So when whenever we’re looking at controlling security throughout the organization, classified, protecting the data we have, we have to take into account and audit those particular vendors and what access levels they may have and conduct risk management appropriate at each one of those vendors.

Contact us to learn more about managed security services

Filed Under: Cyber Security, IT Security Chicago, Managed IT Services Chicago, Network Security, Uncategorized

312-850-5200

216 W. Jackson Blvd.
Chicago, IL 60606

info@onShore.com

  • Email
  • Facebook
  • LinkedIn
  • Twitter
  • YouTube
  • Home
  • Managed Security Services
  • Jobs