Before COVID-19, getting information from your vendors, partners and acquisition targets on their cyber security posture was relatively straightforward. You would reach out, get put in contact with someone in IT, share a set of questions and receive a response. But right now, how do you get that contact when no one is in the office? What if IT is struggling to handle all the remote work and cannot get to the questionnaire? Or even worse, what if the business has shut down completely, but you still need to review them for regulatory reasons?  That is where having the ability to leverage the “outside in”, or externally facing IT infrastructure and digital identity information, is critical. Objective, publicly available information can help you understand the target organization’s potential risk level, highlight red flags and get a sense of their overall cyber security maturity.  

CyberClarity360 is proud to be able to leverage these new “outside in” data sources. Our cyber risk analysis leverages data from strategic partners that continuously monitor the cyber security risk of companies through open-source intelligence techniques. With open-source intelligence, all system discovery and security analytics are passive, based on collection and analytics of publicly available data. 

Join us as we introduce these new features to the risk management processes that Kroll is known for. 

Register now.

Schedule: 10:30 a.m. – 11:30 a.m. (EDT)

Attendees Will

  • Learn what “outside in” data is and how it is acquired
  • Hear about different use cases and how having access to objective, external data can make a critical difference
  • Learn how CyberClarity360 is adding it into its groundbreaking third-party cyber risk assessment platform and how other parts of Kroll are using it for clients

Speakers

Register now.

2020-07-07T00:00:00.0000000 0001-01-01T00:00:00.0000000 /-/media/kroll/images/events/2020/featured-images/kroll-clarity-cyber.jpg /en/insights/events/2020/webcast-kroll-clarity-for-cyber-understanding-cyber-security-risk event {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {8DDC49CA-1D0A-451A-A649-F026824A6638} {24AA49F1-1829-4609-A6DF-399272A6AE2B} {5739AB31-18AC-48E3-B19F-E23AB7AB9E57} {70E25357-B690-49B8-948F-958DAD26DCD4}

Contact Us

Insights

Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk
Cyber Risk

Has COVID–19 Impacted Your Ability to Preserve Evidence for Future Litigation?

Cyber Risk
Cyber Risk

COVID-19 + Shadow IT = Trouble Ahead

Cyber Risk