Latest Research & Insights

Featured-Image-Resources-Dec2016-BitSight-Beyond.jpg

BITSIGHT INSIGHTS: EXPLORING DATA SECURITY IN THE LEGAL SECTOR & BEYOND

Should the legal sector's security performance raiseconcerns for information security teams?

Download Now

FEATURED VIDEOS

HOW TRANSUNION INFORMS AND SCALES VENDOR RISK MANAGEMENT WITH BITSIGHT TECHNOLOGIES

Jasper Ossentjuk, Chief Information Security Officer at TransUnion, discusses the value BitSight brings to his organization. Ossentjuk explores how BitSight helped scale TransUnion's third-party security management program by doing more with less and taking a smarter approach to vendor risk management.

FEATURED WEBINARS

LP-Thumbnail-Webinar-CIO-Benchmarking.png

CYBERSECURITY BENCHMARKING FOR CIOS

Learn why cybersecurity benchmarking is difficult for CIOs and how Security Ratings may solve many benchmarking challenges.
LP-Thumbnail-Webinar-SANS-Ask-The_Expert.png

THE DATA DISCONNECT: WHY NOT ALL SECURITY RATINGS ARE CREATED EQUAL

Learn about the importance of curating high-quality data for security ratings and why verifiable data should be at the heart of any security rating solution.

ON-DEMAND WEBINAR: CONTINUOUS THIRD PARTY MONITORING POWERS BUSINESS OBJECTIVES

How does your company manage its third-party cyber risks? Featuring Forrester Research senior analyst Renee Murphy, this webinar discusses the value in using a solution that has a constant eye on third-party cyber threats.

 

HOW TO PRESENT CYBERSECURITY TO THE BOARD

Cybersecurity is now a top concern of board members. What should they know and how should it be presented? This webinar features insights from Jasper Ossentjuk, CISO of TransUnion, and Richard Clarke, CEO of Good Harbor Security Risk Management.

ON-DEMAND WEBINAR: CYBER INSURANCE UNDERWRITING: A HIGH-TECH, EVOLVING DISCIPLINE?

How are insurance carriers currently assessing and mitigating the risks their insureds face?

FEATURED WHITE PAPERS & EBOOKS

DON'T LET

DON'T LET "TRUSTED" VENDORS BECOME CYBER-BREACH ENABLERS

A “trusted” partner with inadequate security practices may be putting your company at risk. Featuring research and findings from IDG, learn the steps other organizations are taking to secure themselves against third party-risk and how VRM programs are maturing.
DOWNLOAD: 40 QUESTIONS YOU SHOULD HAVE IN YOUR VENDOR SECURITY ASSESSMENT

DOWNLOAD: 40 QUESTIONS YOU SHOULD HAVE IN YOUR VENDOR SECURITY ASSESSMENT

There are thousands of questions you could ask your vendor about security. Can you determine which of them are the most important?

DOWNLOAD REPORTING CYBERSECURITY TO THE BOARD: A CISO’S GO-TO GUIDE

Boards need more information about cybersecurity than ever before. Do you have the tools you need to properly prepare the board with your report?

CYBERSECURITY BENCHMARKING: A CIO’S GUIDE FOR REDUCING SECURITY ANXIETY

Do your competitors and peers have a better cybersecurity game plan than you do? If simply answering that question seems exhausting, this guide can help.

CYBER VULNERABILITY: WHERE DO YOU STAND?

Insurers: Are you continuously monitoring the security of your portfolios? Learn how to stay ahead of the latest vulnerabilities.

FEATURED CASE STUDIES

LP-Thumbnail-Cabelas-Case-Study.png

DOWNLOAD CASE STUDY: CABELA’S STREAMLINES VENDOR MANAGEMENT & IMPROVES CYBERSECURITY POSTURE

Learn how Cabela's used BitSight Security Ratings to streamline its vendor management process.
LP-Thumbnail-case-study-badgerland-3.png

CASE STUDY: BADGERLAND FINANCIAL USES BITSIGHT TO ASSESS THE CYBERSECURITY OF THIRD PARTIES

See how Badgerland Financial uses BitSight Security Ratings to verify and assess the security posture of critical third parties.

DOWNLOAD CASE STUDY: STERIS

See how STERIS, a major medical manufacturer, measures risk levels in its primary and composite networks.

DOWNLOAD CASE STUDY: FINANCIAL FIRM IDENTIFIES & MITIGATES CYBER RISK

Learn how this industry-leading financial firm reduced risk with continuous vendor monitoring.

CASE STUDY: THIS COMPANY PUT BITSIGHT DATA TO THE TEST

Learn how a leading international firm put BitSight’s data to the test to assess the security performance of its vendors.

FEATURED DATA SHEETS

IDENTIFY, MEASURE, REDUCE SECURITY RISK WITH BITSIGHT SECURITY RATINGS

IDENTIFY, MEASURE, REDUCE SECURITY RISK WITH BITSIGHT SECURITY RATINGS

Is your organization empowered with the tools it needs to effectively manage security risk today? Download this data sheet to learn more about what BitSight Security Ratings could do for your enterprise.
DATA SHEET: SECURITY RATINGS FOR VENDOR RISK MANAGEMENT

DATA SHEET: SECURITY RATINGS FOR VENDOR RISK MANAGEMENT

Discover how BitSight Security Ratings for Vendor Risk Management can give you peace of mind when it comes to sharing sensitive data with your business partners.

DATA SHEET: SECURITY RATINGS FOR BENCHMARKING

You spend millions of dollars on people, processes, and technologies to protect your company against cyber risk. But do you know how to measure the success of those investments?

DATA SHEET: SECURITY RATINGS FOR CYBER INSURANCE

Discover how to make informed underwriting decisions and find out what BitSight Security Ratings for Cyber Insurance could do for you.

DATA SHEET: BITSIGHT DISCOVER FOR ENTERPRISES

Find out how BitSight Discover for Enterprises can help identify risky cloud service providers and your connections to other vendors.

FEATURED BLOG POSTS

BI_Legal_large.jpg

DON’T IGNORE LAW FIRMS: WHY CYBERSECURITY IN THE LEGAL SECTOR MATTERS

Explore the current state of data security in the Legal sector and how organizations can improve their cybersecurity and vendor risk management.
The Top 7 CIO Challenges In 2017.jpg

TOP 7 CIO CHALLENGES IN 2017

Learn about the top issues and challenges CIOs will be faced with in 2017 and how to prepare for them.

3 Information Security Risk Assessment Templates

Not sure where to begin your research for a VRM program? Take a look at these three information security risk assessment templates.

Why You Need A Vendor Management Policy

If you haven’t already, it’s (past) time to create a vendor management policy. Here’s the step-by-step process you’ll need to create one.

Cybersecurity Vs. Information Security: Is There A Difference?

Is there really a difference between cybersecurity and information security? We’re exploring that answer here.

EXPERIENCE BITSIGHT SECURITY RATINGS PLATFORM NOW

We’d love to show you how you can simplify your risk management and take charge of your cyber security with these intuitive and powerful solutions.

Request Demo