3rd Party Risk Management , Governance & Risk Management

Digital Transformation: Security Best Practices

RSA's Holly Rollo on the Importance of Third-Party Risk Management
Holly Rollo, SVP & CMO, RSA

Organizations going through a digital transformation need to make sure they develop a sound third-party risk management strategy, says RSA's Holly Rollo, who discusses best practices.

See Also: OnDemand | Secure Your Vendor's Access from Attacks on Third-party Vulnerabilities

”What we’re creating in digital transformation is a world of hyperconnected systems that are all attached to each other," Rollo says. "So we can’t think inside of our silos anymore. We really have to look at our third-party ecosystem. Time spent looking at your overall third-party risk strategy is time well spent.”

In a video interview with Information Security Media Group at the recent RSA Conference 2019 in Singapore, Rollo discusses:

  • Digital transformation and the security landscape;
  • Transformation progress in the past year;
  • A holistic approach to securing hyperconnected systems.

As senior vice president and chief marketing officer at RSA, Rollo leads the company’s ongoing digital and branding transformations. Over the past 25 years, Rollo has led successful transformational initiatives that have driven growth, established global brands and built operational scale. Rollo previously worked at Fortinet.


About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.