“Digital ties among organizations are pervasive now.”

“Many data breaches, hacks, and attacks are facilitated by external digital relationships in which hackers get access to a company’s network through software or connections from a third party,” says Tom Davenport in this new report on managing third-party risk.

Read how Davenport — a world-renowned thought leader and author in analytics, information and knowledge management, process management, and enterprise systems — breaks down the philosophy behind Recorded Future’s third-party risk management solution. He defines some of the key criteria to look for in a threat intelligence solution, including:

  • The need for machine learning and automation when dealing with massive amounts of data at scale
  • The value of real-time updates to risk scores and reporting alongside more traditional static assessments like financial audits and security certifications
  • The importance of transparency when providing risk assessments, including the sources and ranking methods that go into generating risk scores
Tell Your Network

You can unsubscribe from our communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.