Latest Research & Insights

Resources-Main-BitSight-Insights-Ransomware.jpg

BITSIGHT INSIGHTS: A GLOBAL VIEW

Which industry has been hit with the most ransomware infections? The answer may surprise you.

Download Now  

FEATURED VIDEOS

DIRECTOR OF IT INFRASTRUCTURE & SECURITY AT CHART INDUSTRIES DISCUSSES BITSIGHT TECHNOLOGIES

Jack Nichelson, director of IT infrastructure and security at Chart Industries, describes how he uses security ratings to benchmark his security performance against industry peers as well as identify and mitigate security incidents on his network.

FEATURED WEBINARS

VENDOR RISK MANAGEMENT: TRENDS AND MARKET MATURITY

VENDOR RISK MANAGEMENT: TRENDS AND MARKET MATURITY

What kind of programs do organizations have in place to manage risk, and what steps are they taking to mature them?
ON DEMAND: SANS WHAT WORKS

ON DEMAND: SANS WHAT WORKS

Learn how the deputy CISO for Fannie Mae uses BitSight Security Ratings for vendor risk management.

ON-DEMAND WEBINAR: CONTINUOUS THIRD PARTY MONITORING POWERS BUSINESS OBJECTIVES

How does your company manage its third-party cyber risks? Featuring Forrester Research senior analyst Renee Murphy, this webinar discusses the value in using a solution that has a constant eye on third-party cyber threats.

 

HOW TO PRESENT CYBERSECURITY TO THE BOARD

Cybersecurity is now a top concern of board members. What should they know and how should it be presented? This webinar features insights from Jasper Ossentjuk, CISO of TransUnion, and Richard Clarke, CEO of Good Harbor Security Risk Management.

ON-DEMAND WEBINAR: CYBER INSURANCE UNDERWRITING: A HIGH-TECH, EVOLVING DISCIPLINE?

How are insurance carriers currently assessing and mitigating the risks their insureds face?

FEATURED WHITE PAPERS & EBOOKS

DON'T LET

DON'T LET "TRUSTED" VENDORS BECOME CYBER-BREACH ENABLERS

A “trusted” partner with inadequate security practices may be putting your company at risk. Featuring research and findings from IDG, learn the steps other organizations are taking to secure themselves against third party-risk and how VRM programs are maturing.
DOWNLOAD: 40 QUESTIONS YOU SHOULD HAVE IN YOUR VENDOR SECURITY ASSESSMENT

DOWNLOAD: 40 QUESTIONS YOU SHOULD HAVE IN YOUR VENDOR SECURITY ASSESSMENT

There are thousands of questions you could ask your vendor about security. Can you determine which of them are the most important?

DOWNLOAD REPORTING CYBERSECURITY TO THE BOARD: A CISO’S GO-TO GUIDE

Boards need more information about cybersecurity than ever before. Do you have the tools you need to properly prepare the board with your report?

IS CYBER RISK KEEPING YOUR CEO UP AT NIGHT?

Is cyber risk keeping you up at night? Learn how to benchmark your level of risk, manage third-party risk, and more.

CYBER VULNERABILITY: WHERE DO YOU STAND?

Insurers: Are you continuously monitoring the security of your portfolios? Learn how to stay ahead of the latest vulnerabilities.

FEATURED CASE STUDIES

DOWNLOAD CASE STUDY: WHAT WORKS IN SUPPLY CHAIN SECURITY

DOWNLOAD CASE STUDY: WHAT WORKS IN SUPPLY CHAIN SECURITY

Learn how the deputy CISO for Fannie Mae uses BitSight to monitor the security of hundreds of third parties.
CASE STUDY: THIS COMPANY PUT BITSIGHT DATA TO THE TEST

CASE STUDY: THIS COMPANY PUT BITSIGHT DATA TO THE TEST

Learn how a leading international firm put BitSight’s data to the test to assess the security performance of its vendors.

DOWNLOAD CASE STUDY: STERIS

See how STERIS, a major medical manufacturer, measures risk levels in its primary and composite networks.

DOWNLOAD CASE STUDY: FINANCIAL FIRM IDENTIFIES & MITIGATES CYBER RISK

Learn how this industry-leading financial firm reduced risk with continuous vendor monitoring.

CASE STUDY: USING SECURITY RATINGS HELPED THIS BANK REDUCE VENDOR RISK

Learn how North American Bank met and exceeded regulatory guidelines for risk management.

FEATURED DATA SHEETS

IDENTIFY, MEASURE, REDUCE SECURITY RISK WITH BITSIGHT SECURITY RATINGS

IDENTIFY, MEASURE, REDUCE SECURITY RISK WITH BITSIGHT SECURITY RATINGS

Is your organization empowered with the tools it needs to effectively manage security risk today? Download this data sheet to learn more about what BitSight Security Ratings could do for your enterprise.
DATA SHEET: SECURITY RATINGS FOR VENDOR RISK MANAGEMENT

DATA SHEET: SECURITY RATINGS FOR VENDOR RISK MANAGEMENT

Discover how BitSight Security Ratings for Vendor Risk Management can give you peace of mind when it comes to sharing sensitive data with your business partners.

DATA SHEET: SECURITY RATINGS FOR BENCHMARKING

You spend millions of dollars on people, processes, and technologies to protect your company against cyber risk. But do you know how to measure the success of those investments?

DATA SHEET: SECURITY RATINGS FOR CYBER INSURANCE

Discover how to make informed underwriting decisions and find out what BitSight Security Ratings for Cyber Insurance could do for you.

DATA SHEET: BITSIGHT DISCOVER FOR ENTERPRISES

Find out how BitSight Discover for Enterprises can help identify risky cloud service providers and your connections to other vendors.

FEATURED BLOG POSTS

What To Include In Your Cybersecurity Board Of Directors Presentation

What To Include In Your Cybersecurity Board Of Directors Presentation

Whether it’s your first time presenting cybersecurity to your board of directors or you’re a seasoned pro, take a look at these practical suggestions.
A Vendor Risk Management Questionnaire (With 10 Questions You Might Be Afraid To Ask)

A Vendor Risk Management Questionnaire (With 10 Questions You Might Be Afraid To Ask)

Have a handful of vendor risk management questions you’d like to ask, but aren’t able to? We’re here to help!

3 Information Security Risk Assessment Templates

Not sure where to begin your research for a VRM program? Take a look at these three information security risk assessment templates.

Why You Need A Vendor Management Policy

If you haven’t already, it’s (past) time to create a vendor management policy. Here’s the step-by-step process you’ll need to create one.

Cybersecurity Vs. Information Security: Is There A Difference?

Is there really a difference between cybersecurity and information security? We’re exploring that answer here.

EXPERIENCE BITSIGHT SECURITY RATINGS PLATFORM NOW

We’d love to show you how you can simplify your risk management and take charge of your cyber security with these intuitive and powerful solutions.

Request Demo