Vendor Management

New Strategies for Third-Party Management

Bitsight's Jay Jacobs on How to Maximize Your Partnerships

Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.

See Also: Effective Cyber Threat Hunting Requires an Actor and Incident Centric Approach

In a video interview at RSA Conference 2016, Jacobs discusses:

  • His background in data protection;
  • Successful strategies for third-party management;
  • How to leverage third-party info to improve cybersecurity.

Jacobs is the senior data scientist at BitSight. Previously, he was the lead data analyst on the Verizon Data Breach Investigation Report. Jacobs is the co-author of "Data Driven Security," a book covering data analysis and visualizations for information security, and hosts the Data-Driven Security podcast. He is also a co-founder of the Society of Information Risk Analysts and currently serves on its board of directors.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its diverse cadre of senior-level editors and reporters. He also helped to develop and lead ISMG's award-winning Summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network