Intelligent CISO Issue 85 | Page 65

BUSINESS surveillance read and absorb. The curated delivery of data is as important as the collection. This is what is empowering the work that we do today.

Clients have a lot of third-party vendors, partners and suppliers, how does your CTI deal with potential third-party compromises?
A critical part of Bitsight’ s ability today is to monitor organisations and provide the relevant indications to customers as soon as possible on the threats and risks that they may be exposed to as a result of working with third parties. This covers anything from vulnerabilities and exploits to compromised
AI helps prioritise the most important suspicious activities.
credentials of third parties. As well as this, we include the broader picture, looking at relevant risks related to the sector that the third party is in, or the geographical location. It’ s critical to bring in the third party into the exposure story, because it’ s a very important capability of exposure management.
WWW. INTELLIGENTCISO. COM 65