By Karen Kroll2014-11-25T15:00:00
For Target, it was a heating and air conditioning company. At a large oil company it was a nearby Chinese restaurant. Hackers increasingly use third-party relationships to gain access to computer networks and steal data. The trend means that companies need to conduct even better due diligence on third-party relationships ...
You are not logged in and do not have access to members-only content.
If you are already a registered user or a member, SIGN IN now.
Provided by ProcessUnity
In this Compliance Week webinar, we’ll explore the most compelling findings from the report, based on independent global research conducted in collaboration with the Ponemon Institute and informed by responses from more than 1,400 third-party risk leaders and practitioners.
2026-02-02T17:10:00Z By Ruth Prickett
The U.S. action to remove President Nicolás Maduro of Venezuela and reopen access to the country’s oil reserves will have a significant impact on geopolitics and organized crime activities – creating new challenges for global compliance teams.
2026-01-30T18:33:00Z By Shruti Mukherjee CW guest columnist
Over recent years, cybersecurity executives have been tasked with an almost impossible Challenge: reduce headcount, accelerate transformation, integrate artificial intelligence, meet regulatory obligations, and still maintain resilience.
Site powered by Webvision Cloud