Top
IDG Contributor Network: Third-party risk: it’s the second hop you should fear – ANITH
fade
156437
post-template-default,single,single-post,postid-156437,single-format-standard,eltd-core-1.1.1,flow child-child-ver-1.0.0,flow-ver-1.3.6,eltd-smooth-scroll,eltd-smooth-page-transitions,ajax,eltd-blog-installed,page-template-blog-standard,eltd-header-standard,eltd-fixed-on-scroll,eltd-default-mobile-header,eltd-sticky-up-mobile-header,eltd-dropdown-default,wpb-js-composer js-comp-ver-5.0.1,vc_responsive

IDG Contributor Network: Third-party risk: it’s the second hop you should fear

IDG Contributor Network: Third-party risk: it’s the second hop you should fear

GDPR has changed everything now that it is post-May 25, 2018. We can no longer make pro-forma proclamations about being good stewards of others’ data; we will actually be held accountable for losing or misusing data. The fine print in your typical non-disclosure agreement will not protect a company from liability associated with the loss of sensitive data. The buck (or euro) stops at the owner’s desk. What should be the best mitigation strategy for a CISO to deal with this old, but now far more expensive, security problem?

There will be a first offender from an inevitable breach that will be fined by some EU regulator. That’s an easy bet to make. Perhaps Vegas has a betting line on who it may be and how much they are fined, but I don’t think a CISO should be placing any bets. The prudent CISO should be considering a new way to protect data from third-party data losses, the second hop problem. That is, where does your data go when it leaves your hands and gets passed on to another? Are you still liable for what your partner does with your data?

To read this article in full, please click here

Source link

Anith Gopal
No Comments

Post a Comment

two × 1 =

This site uses Akismet to reduce spam. Learn how your comment data is processed.