SlideShare a Scribd company logo
THIRD-PARTY RISK
IN REGULATIONS
August	2018
1	
THIRD-PARTY	RISK	IN	REGULATIONS	
HIDDEN	RISK:	3RD
	PARTY	VENDORS	............................................................................................	2	
Executive	Summary	.............................................................................................................................	2	
THIRD-PARTY	RISK	......................................................................................................................	3	
3rd
-party	risk	is	on	the	rise	...................................................................................................................	4	
What	is	3rd
	party?	................................................................................................................................	4	
GDPR	..........................................................................................................................................	5	
GDPR	rules	apply	to	3rd
	party	data	providers	.......................................................................................	6	
Simple	steps	to	meet	3rd
	party	GDPR	compliance	..................................................................................	6	
NIST	...........................................................................................................................................	7	
What	NIST	says	about	supply	chain	cyber	risk?	....................................................................................	8	
SCRM	activities	listed	by	NIST	................................................................................................................	8	
PCI-DSS	......................................................................................................................................	9	
PCI	DSS’s	Perspective	on	3rd
	Parties	...................................................................................................	10	
What	requirements	may	be	related	to	third	parties?	.........................................................................	11	
Steps	to	prevent	liabilities	from	third-party	service	providers	............................................................	12	
ISO/IEC	27001	..........................................................................................................................	13	
Do	third	parties/	suppliers	have	to	comply	ISO	27001	standards?	......................................................	14	
5	steps	to	check	supplier	ISO/IEC	27001	compliance	...........................................................................	14	
HIPAA	.......................................................................................................................................	15	
3rd
	Party	Risk	in	Healthcare	Industry	..................................................................................................	16	
What	is	HIPAA	take	on	3rd	Party	Vendors	..........................................................................................	17	
Ground	rules	for	3rd
	party	management	with	HIPAA	...........................................................................	17	
COBIT	.......................................................................................................................................	18	
What	is	COBIT’s	View	on	Third-Party	Risk?	........................................................................................	19	
Steps	for	COBIT	compliance	of	third	parties	........................................................................................	19	
NORMSHIELD’S	COMPLIANCE	CHECK	........................................................................................	20	
How	It	Works	.....................................................................................................................................	21	
NORMSHIELD’S	COMPLIANCE	CHECK	........................................................................................	21	
ABOUT	NORMSHIELD	...............................................................................................................	22	
	
	 	
CONTENTS
2	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
	
HIDDEN	RISK:	3RD
	
PARTY	VENDORS	
Executive Summary
Many	companies	rely	on	regulations	created	by	trustworthy	organizations	to	check	their	
cyber	 security	 measurements.	 Compliance	 to	 these	 regulations	 helps	 companies	 and	
organizations	to	improve	their	security	posture	and	they	present	themselves	as	“secure”.	
Lack	of	compliance	may	impose	very	high	penalties	and	reputation	loss.	
	
Even	 though	 compliance-aware	 organizations	 meet	 well-known	 and	 regulated-by-law	
standards,	they	may	still	suffer	penalties	due	to	3rd
	party	vendors’	lack	of	compliance.		
	
	
		
Since	3rd
	party	attacks	(aka	supply	chain	attacks)	are	on	the	rise	recently,	we	examine	
the	perspective	of	regulations	(such	as	GDPR,	NIST,	ISO	27001,	PCI	DSS,	HIPAA,	and	
COBIT)	on	3rd
	party	cyber	risk	management.
3	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
	
	
	
	
	
	
	
	
	
Recent	breach	of	TicketMaster(*)
	originated	from	a	3rd
	party	supplier	for	their	website	
have	increased	attention	to	3rd
	party	risk.	Recently,	we	have	heard	similar	stories	
about	breaches	because	of	3rd	parties	such	as	vendors,	subsidiaries,	web	hosting	
companies,	law	firm	partners,	firms	in	supply	chain,	etc.		
	
Large	companies	such	as	financial	institutions,	e-commerce	companies	have	been	
improving	their	cyber	security	system	for	external	or	even	internal	attacks.	They	can	
internally	identify	vulnerabilities	of	their	own	system	by	monitoring	and/or	scanning	
tools	and	take	necessary	precautions.	However,	all	these	efforts	might	be	for	nothing	
if	3rd	party	cyber	risk	is	unknown.	3rd	party	risk	management	and	data	governance	
are	growing	concerns.	
	
(*)	https://www.normshield.com/lesson-from-ticketmaster-breach-cdn-security-of-third-party-suppliers/	
	
	
THIRD-PARTY
RISK
4	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
	
THIRD-PARTY
RISK
“56% of the companies
have experienced a 3rd
-
party breach in 2017”
3rd
-party risk is on the rise
A	recent	survey	conducted	by	Ponemon	Institute(+)
	
reveals	that	56%	of	companies	have	experienced	a	
3rd-party	breach	in	2017,	which	is	an	increase	of	7%	
compared	to	previous	year.	Data	breaches	caused	
by	third	parties	cost	millions	of	dollars	to	large	
companies.						
	
What is 3rd
party?
Third-parties	include	broad	range	of	companies	a	
company	directly	worked	with	such	as	data	
management	companies,	law	firms,	e-mail	
providers,	web	hosting	companies,	subsidiaries,	
vendors,	sub-contractors,	basically	any	company	
whose	employees	or	systems	have	access	to	your	
systems	or	your	data.	However,	third-party	cyber	
risk	is	not	limited	to	these	companies.	Any	external	
software	or	hardware	that	you	use	for	your	business	
also	poses	a	cyber	risk.	
	
(+)	https://www.opus.com/ponemon/
5	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
	
The	Europe	Union	(EU)	General	Data	Protection	Regulation	(GDPR)	proposed	by	Europe	
Commission	 became	 active	 after	 May	 25,	 2018.	 GDPR	 has	 very	 strict	 rules	 about	
collecting,	storing,	and	processing	data.		
	
Gathering	even	very	small	piece	of	information	about	an	EU	citizen	requires	consent	
from	customer/visitor	and	very	high	responsibility	for	the	companies.	The	fines	are	quite	
high	in	case	of	breach;	they	are	up	to	as	high	as	20	million	Euros	or	4%	of	annual	global	
turnover	whichever	is	the	highest.		
	
Therefore,	 asking	 to	 fill	 a	 form	 even	 for	 a	 newsletter	 requires	 some	 adjustment	 to	
comply	GDPR	rules	and	to	avoid	penalties. 	
GDPRGDPR
Is your website GDPR-compliant?
Check here.
6	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
Businesses,	 as	 ‘data	 controllers’	 have	
been	 preparing	 themselves	 for	 GDPR	
long	before	it	is	forced	by	EU.	However,	
self-preparation	does	not	suffice	unless	
third	 party	 compliance	 is	 taken	 into	
consideration.	 Third	 parties	 use	 and	
store	 personal	 information	 are	 called	
‘data	 processors’	 in	 GDPR	 and	 ‘data	
controllers’	 are	 obligated	 to	 manage	
their	 third-party	 ‘data	 processors’	 for	
them	to	meet	GDPR	rules.	
Simple steps to meet 3rd
party GDPR compliance
• Determine	all	third	parties	(even	
website	applications)	that	operate	
(gather,	store,	and/or	use)	
personal	information	
• Restrict	access	to	sensitive	data	
(does	third	party	really	need	to	
access	that	data)	
• Assess	3rd
	party	for	GDPR	risk	
• Keep	logs	of	all	data-processing	
activities	
• Make	sure	any	data-gathering	
activity	ask	for	consent	from	use	
	
	
	
	
	
	
	
	
	
GDPRGDPR
GDPR rules apply to 3rd
party data providers
7	
THIRD-PARTY	RISK	IN	REGULATIONS	
Recently,	National	Institute	of	Standards	and	Technology	(NIST)	released	new	version	
of	its	Cybersecurity	Framework	(v.	1.1),	which	includes	several	additions	such	as	cyber	
risk	originated	from	supply	chains	(aka	3rd
	party	attacks).	
	
The	 version	 1.1	 is	 a	 risk-based	 framework	 to	 improve	 cybersecurity	 of	 critical	
infrastructure	in	the	US.	However,	it	is	used	by	many	companies	as	a	guideline	to	
assess	 their	 cyber	 risk	 and	 some	 public	 or	 private	 institutions	 are	 looking	 for	
compliance	to	this	framework.	
Source: NIST Cybersecurity Framework v1.1
	
Further	 in	 the	 Section,	 cyber	 SCRM	 is	 described	 in	 a	 full-duplex	 manner	 with	
cybersecurity	 effect	 an	 organization	 [that]	 has	 on	 external	 parties	 and	 the	
cybersecurity	effect	[that]	external	parties	have	on	an	organization	
	
	
	
NIST
8	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
What NIST says about
supply chain cyber risk?
The	 Section	 3.3	 of	 NIST	 updated	
cybersecurity	 framework	 defines	 the	
supply	chain	as	follows;	
	
Supply	 chains	 are	 complex,	 globally	
distributed,	and	interconnected	sets	of	
resources	 and	 processes	 between	
multiple	levels	of	organizations.	Supply	
chains	 begin	 with	 the	 sourcing	 of	
products	and	services	and	extend	from	
the	 design,	 development,	
manufacturing,	 processing,	 handling,	
and	delivery	of	products	and	services	to	
the	end	user.	Given	these	complex	and	
interconnected	 relationships,	 supply	
chain	 risk	 management	 (SCRM)	 is	 a	
critical	organizational	function.	
	
Further	in	the	Section,	cyber	SCRM	is	
described	in	a	full-duplex	manner	with	
cybersecurity	 effect	 an	 organization	
[that]	has	on	external	parties	and	the	
cybersecurity	 effect	 [that]	 external	
parties	have	on	an	organization.	
	
SCRM activities listed by
NIST
• Determining	cybersecurity	
requirements	for	suppliers,			
• Enacting	cybersecurity	
requirements	through	formal	
agreement	(e.g.,	contracts),			
• Communicating	to	suppliers	how	
those	cybersecurity	requirements	
will	be	verified	and	validated,		
• Verifying	that	cybersecurity	
requirements	are	met	through	a	
variety	of	assessment	
methodologies,	and			
• Governing	and	managing	the	
above	activities	
	
	
	
	
	
	
	
NIST
9	
THIRD-PARTY	RISK	IN	REGULATIONS	
Payment	 Card	 Industry	 (PCI)	 Security	 Standard	 Council	 releases	 Data	 Security	
Standard	to	explain	requirements	and	security	assessment	procedures.	The	latest	
version	(v	3.2)	was	released	on	April	2016	and	starting	February	2018	it	became	
effective	as	requirements.		
	
PCI	 is	 an	 internationally-recognized	 institution	 that	 determines	 the	 standards	 for	
payment	card	industry	(including	merchants	of	all	sizes,	financial	institutions,	point-
of-sale	vendors,	and	hardware	and	software	developers)	to	make	cardholders	safer.	
	
	
	
PCI-DSS
Any	 breach	 on	 payment	 systems	 affect	 the	 entire	
payment	ecosystem	and	consequences	usually	results	in	
huge	 financial	 losses.	 Financial	 institutions	 that	
experience	data	breach	lose	credibility	and	reliability.	
	
The	main	document	for	PCI	is	PCI	Data	
Security	 Standards	 (PCI	 DSS)	 which	
provides	 an	 actionable	 framework	 to	
secure	and	make	 robust	payment	card	
data	 processes	 (prevention,	 detection	
and	response	to	cyber	incidents).
10	
THIRD-PARTY	RISK	IN	REGULATIONS	
PCI	DSS	states	that	a	service	provider	or	
a	merchant	may	use	a	third-party	for	
data	 storage,	 processing,	 or	
transmitting	 cardholder	 data	 or	
management	 of	 hardware/software	
components	 (routers,	 firewalls,	
databases,	etc.).		
	
However,	 PCI	 DSS	 immediately	
acknowledges	 that	 if	 a	 third-party	 is	
used,	then	there	may	be	an	impact	on	
cardholder	 data	 ecosystem	 security.	
Therefore,	 they	 offer	 two	 options	 to	
third-party	 services	 to	 validate	
compliance.	Third	parties	can	either		
• Undergo	 an	 annual	 PCI	 DSS	
assessments	 on	 their	 own	 and	
provide	evidence	of	compliance	or	
• Undergo	assessments	upon	request	
of	their	customers	and	participate	
their	customer’s	PCI	DSS	reviews.	
	
	
	
	
	
	
PCI-DSS
PCI DSS’s Perspective on
3rd
Parties
PCI-DSS
11	
THIRD-PARTY	RISK	IN	REGULATIONS	
• SS	Requirements	on	firewall	and	
router	configurations	(1.1,	1.2,	1.3,	
and	1.4)	are	directly	related	to	
third	party	hardware/software	
service	providers	that	handle	these	
tasks.	
• PCI	DSS	also	recommends	to	
always	change	vendor-supplied	
defaults	and	remove	or	disable	
unnecessary	default	accounts	
before	installing	a	system	on	the	
network	(2.1)	including	(but	not	
limited	to)	operating	systems,	
software	that	provides	security	
services,	application	and	system	
accounts,	point-of-sale	(POS)	
terminals,	payment	applications,	
etc.	
• PCI	DSS	mentions	shared	hosting	
providers	(2.6)	by	forcing	them	to	
meet	specific	requirements	
detailed	in	an	Appendix	(A1),	a	
section	whose	sole	purpose	is	to	
explain	Shared	Hosting	Provider	
Requirements.	
• Section	3	is	all	about	how	to	store	
cardholder	data	and	if	a	third-
party	is	used	for	data	storage,	
these	requirements	have	to	be	
met.	The	motto	of	PCI	is	“if	you	
don’t	need	it,	don’t	store	it).	
• Requirements	of	using	anti-virus	
programs	is	given	in	Section	5	and	
these	requirements	also	apply	to	
third	parties.	
• PCI	DSS	defines	requirements	(6.3)	
for	external	software	applications	
(including	web-based	
applications).	
• In	Section	7	and	8,	access	control	is	
defined	to	give	requirements	on	
who	should	access	what.	This	
section	is	directly	related	to	third	
party	data	access.	Third-party	
access	is	explicitly	mentioned	(as	
in	8.3.2).	
• The	risk	from	third-party	personnel	
(such	as	personnel	for	repair	
services)	is	elaborated	(9.9.3)	
	
	
PCI-DSS
What requirements may be related to third
parties?
12	
THIRD-PARTY	RISK	IN	REGULATIONS	
Steps to prevent liabilities from third-party service providers
	
• Establish	agreements	with	third	parties.	Agreements	should	be	written	clearly	
and	should	have	references	to	PCI-DSS.	
• Check	PCI	DSS	requirements	and	determine	which	one	of	those	should	be	met	by	
the	third	party.	
• Monitor	compliance	of	the	third-party	
• Prior	to	work	with	a	third	party,	complete	a	risk	assessment.	
	
	
Build	and	maintain	a	secure	
network	and	systems	
1. Install	and	maintain	a	firewall	configuration	to	protect	
cardholder	data	
2. Do	not	used	vendor-supplied	defaults	for	system	
passwords	and	other	security	parameters		
Protect	cardholder	data	
3. Protect	stored	cardholder	data	
4. Encrypt	transmission	of	cardholder	data	across	open,	
public	networks	
Maintain	a	vulnerability	
management	program	
5. Protect	all	systems	against	malware	and	regularly	update	
anti-virus	software	and	applications	
6. Develop	and	maintain	secure	systems	and	applications	
Implement	strong	access	
control	measures	
7. Restrict	access	to	cardholder	data	by	business	need	to	
know	
8. Identify	and	authenticate	access	to	system	components	
9. Restrict	physical	access	to	cardholder	data	
Regularly	monitor	and	test	
networks	
10. Track	and	monitor	all	access	to	network	resources	and	
cardholder	data	
11. Regularly	test	security	systems	and	processes	
Maintain	an	information	
security	policy	
12. Maintain	a	policy	that	addresses	information	security	for	all	
personnel		
	
	
PCI-DSS
High-Level	Overview	of	PCI-DSS
13	
THIRD-PARTY	RISK	IN	REGULATIONS	
ISO/IEC	 27001	 (some	 only	 write	 ISO	 27001)	 is	 an	 information	 security	 standard	
created	by	ISO	and	IEC	jointly	to	standardize	cyber	security	practices.	It	provides	
certain	control	items	in	18	categories	to	improve	cyber	security	of	an	organization.	
	
Compliance	 to	 ISO	 27001	 standard	 provides	 benefit	 to	 an	 organization	 to	 better	
manage	their	IT	systems	with	those	control	items.	Besides,	organizations	that	meet	
ISO	27001	requirements	can	be	certified	after	an	audit.	The	regulation	is	updated	in	
2017.	
	
	
	
	
	
	 	
ISO/IEC 27001ISO/IEC 27001
14	
THIRD-PARTY	RISK	IN	REGULATIONS	
Yes.	 ISO/IEC	 27001,	 Section	 A15,	
defines	 five	 controls	 for	 Supplier	
Relationships.	Based	on	these	control,	
third	party	compliance	can	be	checked	
in	5	steps.	
	
5 steps to check supplier
ISO/IEC 27001 compliance
• Create	an	information	security	
policy	for	supplier	relationships	
that	address	the	processes	and	
procedures	to	be	implemented	by	
the	organization	to	mitigate	the	
risks	associated	with	the	vendor.	
• Make	the	supplier	sign	a	
contractual	agreement	to	ensure	
that	there	will	not	be	any	
misconceptions	in	future.	For	
example,	the	organization	may	
include	legal	and	regulatory	
requirements,	'right	to	audit'	
clause,	Terms	&	Conditions	etc.,	in	
the	contractual	agreement	
• Be	clear	about	the	agreements	
that	include	requirements	to	
address	information	security	risks	
	
associated	with	Information	and	
communication	technology	
services	such	as	monitoring	
process,	defining	rules	for	sharing	
information	etc.	
• Monitor	and	review	supplier	
services.	The	organization	should	
monitor,	review	and	conduct	
audits	on	supplier	services	at	
regular	intervals	to	ensure	that	
supplier	is	adhere	to	the	terms	and	
conditions	as	per	the	agreement.	
• Manage	change	to	supplier	
services	such	as	update	of	
information	security	policy,	use	of	
new	technologies/tools,	changes	
to	physical	location,	improvised	
services,	etc.	
	
	
	
	
	
	
	
	
	
Do third parties/ suppliers have to comply ISO 27001
standards?
ISO/IEC 27001
15	
THIRD-PARTY	RISK	IN	REGULATIONS	
	 	
The	 Health	 Insurance	 Portability	 and	 Accountability	 Act	 (HIPAA)	 aims	 to	 protect	
health-related	and	personal	information	of	individuals,	including	medical	records,	
health	insurance	data,	SSNs	of	patients,	etc.	These	information	is	very	valuable	and	
profitable	in	the	black	market	of	dark	web.		
	
Every	 year	 the	 data	 theft	 or	 extortion	 through	 ransomwares	 become	 a	 very	 big	
problem	for	healthcare	providers.	Only	last	year,	there	were	more	than	40	major	
breach	incident	happened	in	healthcare	industry	
	
	
	
HIPAA
16	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
When	 we	 examine	 40+	 breach	
incidents	 of	 2017,	 we	 see	 that	 third	
party	 vendors	 are	 second	 most	
frequent	 reason	 behind	 a	 breach	
followed	by	phishing	attacks.		
Health	Insurance	companies,	medical-
equipment	suppliers,	imaging	centers,	
marketing	 companies,	 data-manage-
ment	 companies,	 website	 and	 e-mail	
providers	are	all	potential	third	parties	
that	attackers	can	find	a	way	through	
healthcare	 providers’	 systems.	 Here	
are	 some	 breaches	 caused	 by	 third	
parties	in	2017.	
• A	medical-equipment	supplier,	
Airway	Oxygen,	was	hacked	and	the	
attackers	installed	a	ransomware	by	
holding	500,000	clients’	information	
hostage.		
• iHealth	Innovations,	a	third-party	
managing	the	record	backups	for	
healthcare	providers,	caused	a	
breach	of	tens	of	thousands	
(possibly	up	to	millions)	of	patient		
	
records	at	Bronx-Lebanon	Hospital	
Center	in	New	York	City.	
• New	Jersey	Diamond	Institute	for	
Fertility	and	Menopause	took	the	
advantage	of	using	a	third-party	
server	to	store	electronic	health	
records.	But	this	advantage	turned	
into	a	nightmare	when	more	than	
14,000	patients’	sensitive	
information	were	exposed	after	a	
cyber-attack	to	this	server.	
• An	attack	from	a	third-party	vendor	
system	used	by	Brand	New	Day	(a	
Medicare-approved	health	plan)	
caused	potential	breach	of	14,000	
patients’	information	including	
names,	addresses,	phone	numbers,	
dates	of	birth	and	Medicare	ID	
numbers	of	members.	
	
	
	
3rd
Party Risk in Healthcare Industry
HIPAA
17	
THIRD-PARTY	RISK	IN	REGULATIONS	
Many	healthcare	providers	and	health	
plans	 (covered	 entities)	 know	 the	
consequences	 of	 not	 following	
guidelines	set	by	HIPAA	rules	and	they	
try	 to	 comply	 it	 as	 much	 as	 possible.	
However,	 some	 overlook	 that	 their	
third	 parties	 (business	 associates,	
partners,	 subcontractors)	 should	 also	
meet	HIPAA	regulations.		
As	an	example,	patients’	data	is	given	
to	 a	 research	 company	 (business	
associate)	 and	 the	 research	 company	
uses	 data-management	 firm	 for	 data	
storage	(subcontractor).	Both	research	
company	 as	 business	 associate	 and	
data-management	 firm	 as	
subcontractor	 have	 to	 abide	 HIPAA	
rules.	
	
Ground rules for 3rd
party
management with HIPAA
	
• Business	associates	of	covered	
entities	must	comply	with	the	
applicable	requirements	
• Require	modifications	to,	and	
redistribution	of,	a	covered	entity’s	
notice	of	privacy	practices	
• Strengthen	the	limitations	on	the	
use	and	disclosure	of	protected	
health	information	for	marketing	
and	fundraising	purposes,	and	
prohibit	the	sale	of	protected	
health	information	without	
individual	authorization	
• Expand	individuals’	rights	to	
receive	electronic	copies	of	their	
health	information	and	to	restrict	
disclosures	to	a	health	plan	
concerning	treatment	for	which	
the	individual	has	paid	in	full.	
• A	covered	entity	can	disclose	
protected	health	information	(PHI)	
to	a	business	associate	under	a	
written	contract	with	certain	
assurances	to	comply	certain	parts	
of	the	rule.	Similar	goes	for	
subcontractor	that	business	
associate	work	with	and	have	
access	to	PHI	data.	
	
	
	
What is HIPAA take on 3rd Party Vendors
HIPAA
18	
THIRD-PARTY	RISK	IN	REGULATIONS	
COBIT	 (Control	 Objectives	 for	 Information	 and	 Related	 Technologies)	 created	 by	
ISACA	is	an	integrator	framework	many	IT	standards	such	as	ISO	27001,	COSO,	ITIL,	
etc.	 It	 summarizes	 the	 key	 objectives	 of	 these	 guidance	 materials.	 Since	 the	 first	
version	 released	 in	 1996,	 COBIT	 is	 well-accepted	 by	 an	 international	 material	 for	
enterprise	IT	management	and	governance	with	framework,	process	descriptions,	
control	objectives,	management	guidelines,	and	maturity	models	provided.	
	
Since	 its	 release	 in	 2012,	 COBIT	 5	 has	 become	 a	 good-practice	 framework	 for	 IT	
management	and	governance	for	enterprises.	By	following	certain	checkpoints	in	the	
framework,	a	company	can	create	a	good	IT	risk	management.	
	
	
	
	
*Image	adopted	from	isaca.org	
	
	
	
COBITCOBIT
19	
THIRD-PARTY	RISK	IN	REGULATIONS	
One	 of	 the	 main	 section	 in	 COBIT	
checkpoints	 is	 Delivery	 and	 Support	
(DS)	 where	 the	 second	 subsection	
(DS2)	is	all	about	how	to	manage	third-
party	 services.	 Here,	 third	 parties	 are	
defined	 as	 suppliers,	 vendors	 and	
partners.	 COBIT	 claims	 that	 control	
over	the	IT	process	of	managing	third	
parties	can	be	achieved	by:	
• Identifying	and	categorizing	supplier	
services	
• Identifying	and	mitigating	supplier	
risk	
• Monitoring	and	measuring	supplier	
performance	and	measured	by;	
• Number	of	user	complaints	due	to	
contracted	services	
• Percent	of	major	suppliers	
meeting	clearly	defined	
requirements	and	service	levels	
• Percent	of	major	suppliers	subject	
to	monitoring	
COBIT	explains	details	how	to	manage	
third	party	relationships	in	DS	section	
under	four	categories:	
1. Identification	of	all	supplier	
relationships	
2. Supplier	relationship	management	
3. Supplier	risk	management	
4. Supplier	performance	monitoring	
	
Steps for COBIT compliance
of third parties
	
• Establish	agreements	with	third	
parties.	Agreements	should	be	
written	clearly	and	should	have	
references	to	COBIT.	
• Check	COBIT	control	points	and	
determine	which	one	of	those	
should	be	met	by	the	third	party.	
• Monitor	compliance	of	the	third-
party	
• Prior	to	work	with	a	third	party,	
complete	a	risk	assessment	
	
	
	
	
	
What is COBIT’s View on Third-Party Risk?
COBIT
20	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
All	the	regulations	recommend	to	monitor	third	party	vendors	and	conduct	a	risk	
assessment	 for	 them.	 The	 risk	 assessment	 can	 be	 done	 in	 an	 old-school	 fashion	
questionnaire	 method.	 Unfortunately,	 some	 third-parties	 are	 not	 so	 eager	 to	
respond,	 questions	 might	 not	 cover	 all	 the	 risks,	 and	 the	 answers	 will	 be	 only	
depending	on	what	the	third-party	knows	about	it	IT	structure.		
	
Thus,	NormShield	Cyber	Risk	Scorecard,	with	its	benchmarking	reports,	provides	risk	
scoring	and	ranking	for	companies	and	their	third	parties.	It	also	checks	compliance	
to	 well-known	 cyber	 security	 frameworks	 including	 NIST	 800-53,	 PCI-DSS,	 HIPAA,	
COBIT,	 ISO	 27001,	 GDPR,	 and	 FISMA.	 Even	 prior	 to	 work	 with	 a	 third	 party,	 its	
compliance	to	these	regulations	can	easily	be	checked	with	NormShield	Cyber	Risk	
Scorecard.	
	
	
	
	
NORMSHIELD’S
COMPLIANCE CHECK
21	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
How It Works
NormShield	 classifies	 the	 findings	 into	
FISMA	 Cyber	 Security	 Framework	 Area	
and	Maturity	Level,	NIST	800-53	Control	
Family,	 FIPS-200	 Area,	 NIST	 800-37	
Process	Step.	The	classification	allows	to	
approximately	 predict	 the	 compliance	
level	of	the	target	company	in	terms	of	
different	regulations	including	NIST	800-
53,	FISMA,	ISO27001,	PCI-DSS,	HIPAA	and	
GDPR.	 The	 prediction	 is	 not	 a	
replacement	 of	 regular	 compliance	
assessment	but	it	is	a	very	good	baseline	
to	 start	 working	 on	 it.	 NormShield’s	
shared	responsibility	platform	also	allows	
user	 to	 update	 the	 compliance	 level	 of	
their	 organization	 after	 the	 estimated	
level.	
	
NormShield	has	a	unique	feature	of	cross	
correlation	 between	 different	
regulations.	If	a	company	is	compliant	to	
one	regulation,	our	proprietary	algorithm	
can	 estimate	 the	 compliance	 level	 of	
other	regulations.	
	
	
	
	
	
	
	
	
	
	
	
	
	
NORMSHIELD’S
COMPLIANCE CHECK
22	
THIRD-PARTY	RISK	IN	REGULATIONS	
	
	
We	provide	Cyber	Risk	Scorecard	for	companies	just	like	
FICO	score.	Cyber	security	is	on	every	Board’s	agenda,	
and	the	average	total	cost	of	a	data	breach	has	risen	to	
$4	million	(Ponemon/IBM).		
	
NormShield	 Cyber	 Risk	 Scorecards	 provide	 the	
information	necessary	to	protect	business	from	cyber-
attacks.		
	
The	scorecards	provide	a	letter	grade	and	a	drill	down	
into	the	data	for	each	risk	category	so	that	remediation	
of	 vulnerabilities	 can	 be	 prioritized.	 Unified	 Threat	 &	
Vulnerability	Orchestration	Platform	and	Cyber	Risk	Scorecard.	
	
	
	
	
ABOUT NORMSHIELD	
To	learn	your	company’s	risk	score,	visit	
https://www.normshield.com/		
www.normshield.com		
1	(571)	335	02	22	
info@normshield.com	
	
NormShield	HQ	
8200	Greensboro	Drive	
Suite	900

More Related Content

What's hot

Gis database
Gis databaseGis database
Gis database
anandkc77
 
Income Tax Ordinance 1984
Income Tax Ordinance 1984 Income Tax Ordinance 1984
Income Tax Ordinance 1984
Masum Gazi
 
Real estate guide vatgre1 issue 2 - final
Real estate guide vatgre1   issue 2 - finalReal estate guide vatgre1   issue 2 - final
Real estate guide vatgre1 issue 2 - final
Tareq Azar
 
Getting started with income tax | Tally Chennai | Tally Intergation | Tally ...
Getting started with income tax | Tally Chennai |  Tally Intergation | Tally ...Getting started with income tax | Tally Chennai |  Tally Intergation | Tally ...
Getting started with income tax | Tally Chennai | Tally Intergation | Tally ...
stannventures.Pvt.Ltd
 
Income tax ordinance (updated upto 01.07.14)
Income tax ordinance (updated upto 01.07.14)Income tax ordinance (updated upto 01.07.14)
Income tax ordinance (updated upto 01.07.14)
Asad Mehmood (MBA - Banking & Finance)
 
VAT in UAE - Real Estate Guide
VAT in UAE - Real Estate GuideVAT in UAE - Real Estate Guide
VAT in UAE - Real Estate Guide
Manoj Agarwal
 
Economic Assessment Report for the NY SGEIS
Economic Assessment Report for the NY SGEISEconomic Assessment Report for the NY SGEIS
Economic Assessment Report for the NY SGEIS
Marcellus Drilling News
 
City of Chillicothe Comprehensive Annual Financial Report for 2011
City of Chillicothe Comprehensive Annual Financial Report for 2011City of Chillicothe Comprehensive Annual Financial Report for 2011
City of Chillicothe Comprehensive Annual Financial Report for 2011tomspetnagel
 
Income Tax Rules 1984
Income Tax Rules 1984Income Tax Rules 1984
Income Tax Rules 1984
Masum Gazi
 
Approved budget Fiscal Year 2018
Approved budget Fiscal Year 2018Approved budget Fiscal Year 2018
Approved budget Fiscal Year 2018
Houston Community College
 
The Companies Act 1994
The Companies Act 1994The Companies Act 1994
The Companies Act 1994
Masum Gazi
 
The Income tax rules 1984 updated up to July 2018
The Income tax rules 1984 updated up to July 2018  The Income tax rules 1984 updated up to July 2018
The Income tax rules 1984 updated up to July 2018
Masum Gazi
 
goldman sachs 2008 Form 10-K
goldman sachs 2008 Form 10-K goldman sachs 2008 Form 10-K
goldman sachs 2008 Form 10-K finance2
 
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers UkraineM&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
Christine Khariv
 
Rapport d'évaluation mutuelle d'Haïti
Rapport d'évaluation mutuelle d'HaïtiRapport d'évaluation mutuelle d'Haïti
Rapport d'évaluation mutuelle d'Haïti
Stanley Lucas
 
Pro forma financial information - A guide for applying Article 11 of Regulati...
Pro forma financial information - A guide for applying Article 11 of Regulati...Pro forma financial information - A guide for applying Article 11 of Regulati...
Pro forma financial information - A guide for applying Article 11 of Regulati...
Julien Boucher
 
A Retrospective Assessment of Clean Energy Investments in the Recovery Act
A Retrospective Assessment of Clean Energy Investments in the Recovery ActA Retrospective Assessment of Clean Energy Investments in the Recovery Act
A Retrospective Assessment of Clean Energy Investments in the Recovery ActHaralambos V. Mouselimos
 
Phase III – Analysis of Macroeconomic impact
Phase III – Analysis of Macroeconomic impactPhase III – Analysis of Macroeconomic impact
Phase III – Analysis of Macroeconomic impacteconsultbw
 

What's hot (19)

Gis database
Gis databaseGis database
Gis database
 
Income Tax Ordinance 1984
Income Tax Ordinance 1984 Income Tax Ordinance 1984
Income Tax Ordinance 1984
 
Real estate guide vatgre1 issue 2 - final
Real estate guide vatgre1   issue 2 - finalReal estate guide vatgre1   issue 2 - final
Real estate guide vatgre1 issue 2 - final
 
Getting started with income tax | Tally Chennai | Tally Intergation | Tally ...
Getting started with income tax | Tally Chennai |  Tally Intergation | Tally ...Getting started with income tax | Tally Chennai |  Tally Intergation | Tally ...
Getting started with income tax | Tally Chennai | Tally Intergation | Tally ...
 
Income tax ordinance (updated upto 01.07.14)
Income tax ordinance (updated upto 01.07.14)Income tax ordinance (updated upto 01.07.14)
Income tax ordinance (updated upto 01.07.14)
 
VAT in UAE - Real Estate Guide
VAT in UAE - Real Estate GuideVAT in UAE - Real Estate Guide
VAT in UAE - Real Estate Guide
 
Economic Assessment Report for the NY SGEIS
Economic Assessment Report for the NY SGEISEconomic Assessment Report for the NY SGEIS
Economic Assessment Report for the NY SGEIS
 
City of Chillicothe Comprehensive Annual Financial Report for 2011
City of Chillicothe Comprehensive Annual Financial Report for 2011City of Chillicothe Comprehensive Annual Financial Report for 2011
City of Chillicothe Comprehensive Annual Financial Report for 2011
 
Income Tax Rules 1984
Income Tax Rules 1984Income Tax Rules 1984
Income Tax Rules 1984
 
Approved budget Fiscal Year 2018
Approved budget Fiscal Year 2018Approved budget Fiscal Year 2018
Approved budget Fiscal Year 2018
 
The Companies Act 1994
The Companies Act 1994The Companies Act 1994
The Companies Act 1994
 
The Income tax rules 1984 updated up to July 2018
The Income tax rules 1984 updated up to July 2018  The Income tax rules 1984 updated up to July 2018
The Income tax rules 1984 updated up to July 2018
 
ICICI BANK auditor
ICICI BANK auditor ICICI BANK auditor
ICICI BANK auditor
 
goldman sachs 2008 Form 10-K
goldman sachs 2008 Form 10-K goldman sachs 2008 Form 10-K
goldman sachs 2008 Form 10-K
 
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers UkraineM&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
M&A transactions in Ukraine 2019: antimonopoly aspects by DLF lawyers Ukraine
 
Rapport d'évaluation mutuelle d'Haïti
Rapport d'évaluation mutuelle d'HaïtiRapport d'évaluation mutuelle d'Haïti
Rapport d'évaluation mutuelle d'Haïti
 
Pro forma financial information - A guide for applying Article 11 of Regulati...
Pro forma financial information - A guide for applying Article 11 of Regulati...Pro forma financial information - A guide for applying Article 11 of Regulati...
Pro forma financial information - A guide for applying Article 11 of Regulati...
 
A Retrospective Assessment of Clean Energy Investments in the Recovery Act
A Retrospective Assessment of Clean Energy Investments in the Recovery ActA Retrospective Assessment of Clean Energy Investments in the Recovery Act
A Retrospective Assessment of Clean Energy Investments in the Recovery Act
 
Phase III – Analysis of Macroeconomic impact
Phase III – Analysis of Macroeconomic impactPhase III – Analysis of Macroeconomic impact
Phase III – Analysis of Macroeconomic impact
 

Similar to Third-Party Risk in Regulations

Sample Self-Sovereign Identity Market Report 2022
Sample  Self-Sovereign Identity Market Report 2022  Sample  Self-Sovereign Identity Market Report 2022
Sample Self-Sovereign Identity Market Report 2022
Cognitive Market Research
 
Sample Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
Sample  Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...Sample  Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
Sample Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
Cognitive Market Research
 
fannie mae 2005 Form 10-K
fannie mae 2005 Form 10-Kfannie mae 2005 Form 10-K
fannie mae 2005 Form 10-Kfinance6
 
2013 Form 20-F
2013 Form 20-F 2013 Form 20-F
2013 Form 20-F Gruppo TIM
 
Proxy Statements
Proxy StatementsProxy Statements
Proxy Statements
Polia A. Nair CPA, CFA
 
fannie mae Form 10-K 2007
fannie mae  Form 10-K 2007fannie mae  Form 10-K 2007
fannie mae Form 10-K 2007finance6
 
fannie mae 2007 Year-End Earnings/Annual Report
fannie mae   2007 Year-End Earnings/Annual Reportfannie mae   2007 Year-End Earnings/Annual Report
fannie mae 2007 Year-End Earnings/Annual Reportfinance6
 
Cpuc financing report_hb&c_jul8v2
Cpuc financing report_hb&c_jul8v2Cpuc financing report_hb&c_jul8v2
Cpuc financing report_hb&c_jul8v2HarcourtBrownEF
 
2012 Form 20-F
2012 Form 20-F 2012 Form 20-F
2012 Form 20-F Gruppo TIM
 
2015 FORM 20-F
2015 FORM 20-F2015 FORM 20-F
2015 FORM 20-F
Gruppo TIM
 
Bcv informe económico 2009 en ingles.
Bcv informe económico 2009 en ingles.Bcv informe económico 2009 en ingles.
Bcv informe económico 2009 en ingles.Rafael Verde)
 
International market penetration_study (1)
International market penetration_study (1)International market penetration_study (1)
International market penetration_study (1)
Ahmad Shalabi
 
fannie mae 2007 1st
fannie mae 2007 1stfannie mae 2007 1st
fannie mae 2007 1stfinance6
 
Sample Global Whole house
Sample Global Whole house Sample Global Whole house
Sample Global Whole house
Cognitive Market Research
 
Second Revision Syria Regional Response Plan
Second Revision Syria Regional Response PlanSecond Revision Syria Regional Response Plan
Second Revision Syria Regional Response PlanJesse Budlong
 
Currency derivatives
Currency derivativesCurrency derivatives
Currency derivativesanilkumar03
 
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
Pantho Sarker
 
Sample Children Playground Equipment Market Report 2022
Sample  Children Playground Equipment Market Report 2022 Sample  Children Playground Equipment Market Report 2022
Sample Children Playground Equipment Market Report 2022
Cognitive Market Research
 
Sample Children Playground Equipment Market Report 2022 - Cognitive Market R...
Sample  Children Playground Equipment Market Report 2022 - Cognitive Market R...Sample  Children Playground Equipment Market Report 2022 - Cognitive Market R...
Sample Children Playground Equipment Market Report 2022 - Cognitive Market R...
Cognitive Market Research
 
United Health Group [PDF Document] Form 10-Q
United Health Group [PDF Document] Form 10-QUnited Health Group [PDF Document] Form 10-Q
United Health Group [PDF Document] Form 10-Qfinance3
 

Similar to Third-Party Risk in Regulations (20)

Sample Self-Sovereign Identity Market Report 2022
Sample  Self-Sovereign Identity Market Report 2022  Sample  Self-Sovereign Identity Market Report 2022
Sample Self-Sovereign Identity Market Report 2022
 
Sample Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
Sample  Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...Sample  Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
Sample Self-Sovereign Identity Market Report 2022 - Cognitive Market Researc...
 
fannie mae 2005 Form 10-K
fannie mae 2005 Form 10-Kfannie mae 2005 Form 10-K
fannie mae 2005 Form 10-K
 
2013 Form 20-F
2013 Form 20-F 2013 Form 20-F
2013 Form 20-F
 
Proxy Statements
Proxy StatementsProxy Statements
Proxy Statements
 
fannie mae Form 10-K 2007
fannie mae  Form 10-K 2007fannie mae  Form 10-K 2007
fannie mae Form 10-K 2007
 
fannie mae 2007 Year-End Earnings/Annual Report
fannie mae   2007 Year-End Earnings/Annual Reportfannie mae   2007 Year-End Earnings/Annual Report
fannie mae 2007 Year-End Earnings/Annual Report
 
Cpuc financing report_hb&c_jul8v2
Cpuc financing report_hb&c_jul8v2Cpuc financing report_hb&c_jul8v2
Cpuc financing report_hb&c_jul8v2
 
2012 Form 20-F
2012 Form 20-F 2012 Form 20-F
2012 Form 20-F
 
2015 FORM 20-F
2015 FORM 20-F2015 FORM 20-F
2015 FORM 20-F
 
Bcv informe económico 2009 en ingles.
Bcv informe económico 2009 en ingles.Bcv informe económico 2009 en ingles.
Bcv informe económico 2009 en ingles.
 
International market penetration_study (1)
International market penetration_study (1)International market penetration_study (1)
International market penetration_study (1)
 
fannie mae 2007 1st
fannie mae 2007 1stfannie mae 2007 1st
fannie mae 2007 1st
 
Sample Global Whole house
Sample Global Whole house Sample Global Whole house
Sample Global Whole house
 
Second Revision Syria Regional Response Plan
Second Revision Syria Regional Response PlanSecond Revision Syria Regional Response Plan
Second Revision Syria Regional Response Plan
 
Currency derivatives
Currency derivativesCurrency derivatives
Currency derivatives
 
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
Analysis of Financial Condition and Dividend Pattern of Beximco Pharmaceutica...
 
Sample Children Playground Equipment Market Report 2022
Sample  Children Playground Equipment Market Report 2022 Sample  Children Playground Equipment Market Report 2022
Sample Children Playground Equipment Market Report 2022
 
Sample Children Playground Equipment Market Report 2022 - Cognitive Market R...
Sample  Children Playground Equipment Market Report 2022 - Cognitive Market R...Sample  Children Playground Equipment Market Report 2022 - Cognitive Market R...
Sample Children Playground Equipment Market Report 2022 - Cognitive Market R...
 
United Health Group [PDF Document] Form 10-Q
United Health Group [PDF Document] Form 10-QUnited Health Group [PDF Document] Form 10-Q
United Health Group [PDF Document] Form 10-Q
 

More from NormShield

HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
NormShield
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
NormShield
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
NormShield
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
NormShield
 
NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18
NormShield
 
NormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management InfographicNormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management Infographic
NormShield
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
NormShield
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
NormShield
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018
NormShield
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
NormShield
 

More from NormShield (10)

HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOUHOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
HOW TO MEASURE WHAT HACKERS KNOW ABOUT YOU
 
Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018Major 3rd-Party Data Breaches Of 2018
Major 3rd-Party Data Breaches Of 2018
 
Normshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing ReportNormshield 2018 Airlines Phishing Report
Normshield 2018 Airlines Phishing Report
 
Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?Are There Any Domains Impersonating Your Company For Phishing?
Are There Any Domains Impersonating Your Company For Phishing?
 
NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18NormShield Cyber Risk Rating October 18
NormShield Cyber Risk Rating October 18
 
NormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management InfographicNormShield Supply Chain Risk Management Infographic
NormShield Supply Chain Risk Management Infographic
 
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring ToolsReview on 3rd-party Cyber Risk Assessment and Scoring Tools
Review on 3rd-party Cyber Risk Assessment and Scoring Tools
 
3rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 20183rd Part Cyber Risk Report - 2018
3rd Part Cyber Risk Report - 2018
 
NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018NormShield Crypto Currency Report 2018
NormShield Crypto Currency Report 2018
 
NormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk BriefNormShield 2018 Cyber Security Risk Brief
NormShield 2018 Cyber Security Risk Brief
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Third-Party Risk in Regulations