
Sign up to save your podcasts
Or


In today's complex business systems it's hard to not have 3rd party components used within your environment. Whether it's an open source module or a leading vendor commercial product you need to ensure that those meet your security standards. This episode talks about how most businesses today do not manage 3rd party cyber risk efficiently and how this can be a big problem for you.
Be aware, be safe.
Sign-Up For FREE security awareness training here.
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Binary Blogger Website
Security In Five Website
Security In Five Podcast Page - Podcast RSS
Twitter @securityinfive
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]
By Drew KoenigIn today's complex business systems it's hard to not have 3rd party components used within your environment. Whether it's an open source module or a leading vendor commercial product you need to ensure that those meet your security standards. This episode talks about how most businesses today do not manage 3rd party cyber risk efficiently and how this can be a big problem for you.
Be aware, be safe.
Sign-Up For FREE security awareness training here.
Become A Patron! Patreon Page
*** Support the podcast with a cup of coffee *** - Ko-Fi Security In Five
Don't forget to subscribe to the Security In Five Newsletter.
—————— Where you can find Security In Five ——————
Security In Five Reddit Channel r/SecurityInFive
Binary Blogger Website
Security In Five Website
Security In Five Podcast Page - Podcast RSS
Twitter @securityinfive
iTunes, YouTube, TuneIn, iHeartRadio, Spotify, Stitcher
Email - [email protected]