In episode 44 of the Cybersecurity Minute, Robert Wood explains how to apply threat modeling solutions within the context of third-party risk management.
This episode of the Cybersecurity Minute is sponsored by Acceleration Economy’s Digital CIO Summit, taking place April 4-6. Register for the free event here. Tune in to the event to hear from CIO practitioners discuss their modernization and growth strategies.
Highlights
00:30 — In this episode, Robert discusses threat modeling within the context of third-party risk management and supply chain risk management — currently a very hot topic these days.
00:55 — Robert explains why thread modeling is important because third-party technology solutions and tools that you bring in are increasingly integrating into your business processes, other tools, and data and these, in turn, generate data and flow into other processes. In this way, threat modeling is becoming connected to the your whole ecosystem.
01:19 — Robert encourages organizations to identify the top three to five third-party providers and run threat models on all of them. Robert trusts that teams will identify valuable insights about risk management through this process.
Which companies are the most important vendors in cybersecurity? Click here to see the Acceleration Economy Top 10 Cybersecurity Shortlist, as selected by our expert team of practitioner analysts.