Connect with us

Hi, what are you looking for?


Identity & Access

Webinar Today: Understanding Hidden Third-Party Identity Access Risks

Webinar on third-party identity access risks will discuss topics such as unauthorized access, data breaches, and the manipulation or theft of sensitive information

Live Webinar – Tuesday, March 28th at 1PM ET – Register to Attend

Join SecurityWeek and Saviynt for a live webinar on March 28th as we delve into the topic of Hidden Third-Party Identity Access Risks and explore the potential security threats that can arise when third parties are granted access to an organization’s sensitive data or systems.

Join the discussion as we address the various types of risks that organizations may face, such as unauthorized access, data breaches, and the manipulation or theft of sensitive information, and cover best practices for managing these risks, including how to:

  • Conduct thorough background checks on third-party vendors
  • Implement strict access controls, and regularly monitor and audit third-party access.
  • Manage these risks and address the importance of having clear policies and incident response plans in place.

Register now to learn how you can better protect your organization’s sensitive data and maintain the trust of your customers, partners, and other stakeholders.

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

SecurityWeek’s Threat Detection and Incident Response Summit brings together security practitioners from around the world to share war stories on breaches, APT attacks and threat intelligence.


Securityweek’s CISO Forum will address issues and challenges that are top of mind for today’s security leaders and what the future looks like as chief defenders of the enterprise.


Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Identity & Access

NSA publishes recommendations on maturing identity, credential, and access management capabilities to improve cyberthreat protections.