Part 1

Complexities of Third Party Vendors in Cybersecurity?

Our panel of experts discuss some of the fundamental security concerns around the management of third party risk and what we need to do as an industry to ensure better security oversight of the supply chain, including a unique perspective on how they combat these issues within their own industries.

You Won’t Believe How This Cyberattack on Target happened

Big business knows it can be a target for cybercrime, so they invest in defences like software, people and training.

Now hackers have turned to their smaller suppliers as a way to get in. In hacker:HUNTER Behind the Screens Episode 2, we look at a data theft from US retail giant @Targehat happened through the most unlikely machine.

Watch Now

Talk to us

Please do not hesitate to contact us if you would like any further information or have any questions.

Request a call
Get in touch