Author: Matthieu Péquin

How to define an effective third-party cyber risk management strategy?

More and more clients request our help regarding their third-party cyber risk management strategy. Indeed, third parties constitute a privileged attack vector. A recent study from Soha Systems showed that 60% of security incidents involve directly or indirectly a supplier.…

Back to top