
Monitoring Third-Party Breach Risks
BitSight's Stephen Boyer on the Merits of Continuous Monitoring
February 4, 2015
Audio is streamed directly from the publisher (ismg-cdn.nyc3.cdn.digitaloceanspaces.com) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
About this episode
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.