In this chapter, we continue our discussion of technology defenses and cover fighting third-party risk, software vulnerabilities, unencrypted data, and inadvertent employee mistakes.
Mitigating Third-Party Risk
As we have seen in the first part of this book, many data breaches start with compromises at third parties. Virtually no organization can operate as an island, and virtually every organization relies on a number of third parties—sometimes a few, sometimes a dozen, sometimes hundreds, ...