Old threats, new faces: Navigating the persistent and ever-changing third-party cyber security landscape

Wednesday
 
27
 
November
1:30 pm
 - 
2:10 pm

Speakers

Mark Jones

Mark Jones

Senior Partner
Tesserent

Synopsis

In today’s interconnected digital world, the cyber security landscape is continually evolving, presenting both familiar and novel challenges to organisations worldwide. The session titled "Old Threats, New Faces: Navigating the Persistent and Ever-Changing Third-Party Cyber Security Landscape" will delve into the intricate dynamics of third-party cyber threats, highlighting the necessity for robust security measures and adaptive strategies.

The cyber security landscape is marked by a complex interplay of old threats resurfacing in new forms and novel challenges arising from technological advancements. As organisations increasingly rely on third-party vendors and service providers, the attack surface expands, making third-party cyber security a critical concern. This session aims to explore the persistent nature of cyber threats, emphasising how traditional vulnerabilities are exploited with modern techniques, and the new faces these threats assume in the digital age.

The discussion will provide a comprehensive overview of the following key areas:

  1. Historical Context and Evolution of Cyber Threats: Understanding how past threats have evolved and adapted to current technologies, and the implications for modern cyber security strategies. This historical perspective will highlight the cyclical nature of certain cyber threats, demonstrating how old techniques are repurposed to exploit new vulnerabilities.
  2. Current Third-Party Cyber Security Challenges: Identifying and analysing the specific risks posed by third-party relationships, including supply chain vulnerabilities, data breaches, and compliance issues. This section will discuss the complexities of managing third-party risks and the importance of robust vendor management practices.
  3. Strategic Risk Management: Developing robust frameworks to manage third-party risks, including vendor assessments, continuous monitoring, and incident response planning. Attendees will learn about the critical components of an effective third-party risk management strategy and how to implement them within their organisations.
  4. Technological Solutions and Innovations: Leveraging cutting-edge technologies such as AI, machine learning, and advanced analytics to detect and mitigate third-party cyber threats. This part of the session will showcase innovative tools and technologies that can enhance third-party cyber security measures, providing practical insights into their application.
  5. Case Studies and Best Practices: Learning from real-world examples and industry best practices to enhance third-party cyber security measures. Through case studies, attendees will gain a deeper understanding of successful strategies and common pitfalls in managing third-party cyber security risks.

Attendees will gain valuable insights into managing third-party risks, safeguarding sensitive information, and maintaining compliance with industry standards in an increasingly complex cyber security environment. This session is designed to equip organisations with the knowledge and strategies needed to fortify their defences against a dynamic threat landscape, ensuring they are prepared to face both old and new cyber security challenges effectively.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.

Acknowledgement of Country