Vendor Management

New Strategies for Third-Party Management

Bitsight's Jay Jacobs on How to Maximize Your Partnerships

Increasingly, regulatory agencies are pressuring organizations to assess and attest to the cybersecurity of their business partners. Jay Jacobs of Bitsight Technologies discusses strategies for third-party management.

See Also: Eight Capabilities IT Pros Should Look for in a CASB

In a video interview at RSA Conference 2016, Jacobs discusses:

  • His background in data protection;
  • Successful strategies for third-party management;
  • How to leverage third-party info to improve cybersecurity.

Jacobs is the senior data scientist at BitSight. Previously, he was the lead data analyst on the Verizon Data Breach Investigation Report. Jacobs is the co-author of "Data Driven Security," a book covering data analysis and visualizations for information security, and hosts the Data-Driven Security podcast. He is also a co-founder of the Society of Information Risk Analysts and currently serves on its board of directors.


About the Author

Tom Field

Tom Field

Vice President - Editorial, ISMG

Field is an award-winning journalist with over 30 years experience in newspapers, magazines, books, events and electronic media. A veteran community journalist with extensive business/technology and international reporting experience, Field joined ISMG in 2007 and currently oversees the editorial operations for all of ISMG's global media properties. An accomplished public speaker, Field has developed and moderated scores of podcasts, webcasts, roundtables and conferences, and he has appeared at RSA Conference and on various C-SPAN, The History Channel and Travel Channel television programs.




Around the Network