“Digital ties among organizations are pervasive now.”

“Many data breaches, hacks, and attacks are facilitated by external digital relationships in which hackers get access to a company’s network through software or connections from a third party,” says Tom Davenport in this new report on managing third-party risk.

Read how Davenport — a world-renowned thought leader and author in analytics, information and knowledge management, process management, and enterprise systems — breaks down the philosophy behind Recorded Future’s third-party risk management solution. He defines some of the key criteria to look for in a threat intelligence solution, including:

  • The need for machine learning and automation when dealing with massive amounts of data at scale
  • The value of real-time updates to risk scores and reporting alongside more traditional static assessments like financial audits and security certifications
  • The importance of transparency when providing risk assessments, including the sources and ranking methods that go into generating risk scores
Tell Your Network

By supplying your contact information, you authorize Recorded Future to contact you. You may opt out at anytime.

We'll never rent or sell your information to other vendors. Period.