Podcast
Questions and Answers
What should a company do to protect against the highest risk vendors?
What should a company do to protect against the highest risk vendors?
Why is it important to categorize the risk associated with providing data to third party vendors?
Why is it important to categorize the risk associated with providing data to third party vendors?
What happened in November of 2013 involving Target and a third party vendor?
What happened in November of 2013 involving Target and a third party vendor?
Why is it important to have a list of security requirements in the original contract with a third party vendor?
Why is it important to have a list of security requirements in the original contract with a third party vendor?
Signup and view all the answers
What is almost required when working with a cloud service?
What is almost required when working with a cloud service?
Signup and view all the answers
What kind of data is shared with third party vendors in business relationships?
What kind of data is shared with third party vendors in business relationships?
Signup and view all the answers
What type of agreement sets a minimum set of service terms for a particular service or product when working with a third party?
What type of agreement sets a minimum set of service terms for a particular service or product when working with a third party?
Signup and view all the answers
Which document acts as an informal letter of intent between two parties and may contain confidential information related to a particular business process?
Which document acts as an informal letter of intent between two parties and may contain confidential information related to a particular business process?
Signup and view all the answers
What type of agreement creates confidentiality between parties to prevent the disclosure of shared information to others?
What type of agreement creates confidentiality between parties to prevent the disclosure of shared information to others?
Signup and view all the answers
Which evaluation assesses the quality of the measurement process used in a company's measurement systems?
Which evaluation assesses the quality of the measurement process used in a company's measurement systems?
Signup and view all the answers
What agreement provides details about ownership stakes, financial agreements, and decision-making in a business partnership?
What agreement provides details about ownership stakes, financial agreements, and decision-making in a business partnership?
Signup and view all the answers
When does a manufacturer stop selling and supporting a product?
When does a manufacturer stop selling and supporting a product?
Signup and view all the answers
Which type of agreement is an informal letter of intent that may not have the same binding qualities as a contract?
Which type of agreement is an informal letter of intent that may not have the same binding qualities as a contract?
Signup and view all the answers
How did the malware initially infect the Target network?
How did the malware initially infect the Target network?
Signup and view all the answers
What was a consequence of the malware infecting the Target network?
What was a consequence of the malware infecting the Target network?
Signup and view all the answers
Why is it important to assess security risks in the supply chain?
Why is it important to assess security risks in the supply chain?
Signup and view all the answers
How did SolarWinds customers unknowingly install malware onto their systems?
How did SolarWinds customers unknowingly install malware onto their systems?
Signup and view all the answers
What made customers trust the malware-infected software update from SolarWinds?
What made customers trust the malware-infected software update from SolarWinds?
Signup and view all the answers
What can be a potential security concern between a business partner's network and your corporate network?
What can be a potential security concern between a business partner's network and your corporate network?
Signup and view all the answers
Why might an IPsec connection between corporations pose a risk?
Why might an IPsec connection between corporations pose a risk?
Signup and view all the answers
Why is it important for a company to categorize the risk associated with providing data to third party vendors?
Why is it important for a company to categorize the risk associated with providing data to third party vendors?
Signup and view all the answers
What is a crucial step in protecting against potential security breaches when working with third party vendors?
What is a crucial step in protecting against potential security breaches when working with third party vendors?
Signup and view all the answers
What role does the original contract play in maintaining security standards with third party vendors?
What role does the original contract play in maintaining security standards with third party vendors?
Signup and view all the answers
In what situation would a company not be as vulnerable to data breaches when working with third party vendors?
In what situation would a company not be as vulnerable to data breaches when working with third party vendors?
Signup and view all the answers
What potential consequence could arise if a company fails to categorize the risk associated with sharing data with third party vendors?
What potential consequence could arise if a company fails to categorize the risk associated with sharing data with third party vendors?
Signup and view all the answers
How can having a list of security requirements in the original contract benefit a company working with third party vendors?
How can having a list of security requirements in the original contract benefit a company working with third party vendors?
Signup and view all the answers
What document provides a way for a company to evaluate and assess the quality of the process used in their measurement systems?
What document provides a way for a company to evaluate and assess the quality of the process used in their measurement systems?
Signup and view all the answers
What was the initial infection vector for the malware that affected the Target network?
What was the initial infection vector for the malware that affected the Target network?
Signup and view all the answers
In a business partnership, which agreement provides information about ownership stakes, financial agreements, and decision-making processes?
In a business partnership, which agreement provides information about ownership stakes, financial agreements, and decision-making processes?
Signup and view all the answers
Why did the malware manage to spread from the HVAC vendor to the Target servers?
Why did the malware manage to spread from the HVAC vendor to the Target servers?
Signup and view all the answers
Which type of agreement is an informal understanding between two parties that may contain confidential information regarding a specific business process?
Which type of agreement is an informal understanding between two parties that may contain confidential information regarding a specific business process?
Signup and view all the answers
What allowed attackers to gain access to over 110 million credit card numbers in the Target breach?
What allowed attackers to gain access to over 110 million credit card numbers in the Target breach?
Signup and view all the answers
When working with third parties, what provides a minimum set of service terms for a particular service or product?
When working with third parties, what provides a minimum set of service terms for a particular service or product?
Signup and view all the answers
What is a potential consequence of not assessing security risks in the supply chain?
What is a potential consequence of not assessing security risks in the supply chain?
Signup and view all the answers
What is a common way to manage exactly what type of traffic can be transferred between two networks when in a business partnership?
What is a common way to manage exactly what type of traffic can be transferred between two networks when in a business partnership?
Signup and view all the answers
Why did SolarWinds customers unknowingly install malware onto their systems?
Why did SolarWinds customers unknowingly install malware onto their systems?
Signup and view all the answers
In the context of confidentiality between parties, which agreement creates privacy between them to avoid disclosing shared information?
In the context of confidentiality between parties, which agreement creates privacy between them to avoid disclosing shared information?
Signup and view all the answers
How did attackers compromise thousands of networks through SolarWinds?
How did attackers compromise thousands of networks through SolarWinds?
Signup and view all the answers
When planning to go into business with a third party, what might be used as an informal letter of intent regarding specific business processes?
When planning to go into business with a third party, what might be used as an informal letter of intent regarding specific business processes?
Signup and view all the answers
What poses a significant security concern in a direct network connection between a corporate network and a business partner's network?
What poses a significant security concern in a direct network connection between a corporate network and a business partner's network?
Signup and view all the answers
What type of agreement may not have the binding qualities of a full contract but informs parties of expectations?
What type of agreement may not have the binding qualities of a full contract but informs parties of expectations?
Signup and view all the answers
Why is it crucial to monitor data transfer between corporate and business partner networks?
Why is it crucial to monitor data transfer between corporate and business partner networks?
Signup and view all the answers
When working with third parties, what kind of agreement might set a minimum level of service for internet access?
When working with third parties, what kind of agreement might set a minimum level of service for internet access?
Signup and view all the answers
What is one crucial step in handling risks associated with a direct network connection between corporate and business partner networks?
What is one crucial step in handling risks associated with a direct network connection between corporate and business partner networks?
Signup and view all the answers
What is used to assess the quality of the process in the measurement systems within a company?
What is used to assess the quality of the process in the measurement systems within a company?
Signup and view all the answers
Why should policies be established for secure data transfer between corporate and business partner networks?
Why should policies be established for secure data transfer between corporate and business partner networks?
Signup and view all the answers