Five Best Practices to Manage and Control Third-Party Risk

Provided by CA Technologies

Category Risk

Type White Paper

Length 22

Publish Date May 17 2016

Date posted October 07 2016


Whether they are obtained maliciously or leveraged inappropriately by a valid user, exploited third-party user accounts are a common thread in many data breaches. And as your ecosystem of vendors grows, so does the challenge of defending against such attacks. This paper from CA provides five best practices for controlling third-party vendor risks.


Most Recent Comments


Should we donate our health data the same way we donate organs?