UNITED Security Summit San Francisco 2012 - imagethink

Preview and download all of the digital versions of ImageThink's visual notes from your session. Come back anytime, your work will be here and free for you to download!

Love what you see? Get even more impact from your visual notes by ordering prints, books, or even mugs all through this page. Get started by selecting the "buy" button.

Thank you!

Enduring Impact

Ensure your session lives on with a printed asset - on a mug, on a shirt, card, mousepad, book, etc - after your event.
Deliverable_OrginalArt
Powered by SmugMug Log In
Randy Janinda key note - Risk Assessments of Vendors & Third Parties

Outsourcing business functions does not absolve you from the responsibility of protecting your information or your systems. Yet, as we have performed security evaluations on various vendors, large and small, we continually find 1) that they have limited experience with information security and 2) their current clients didn't ask the questions we are asking about encryption, data retention, access control, organizational security, etc. We'll share examples, stats and what worked (or didn't) as we implemented a program to assess risk with third-parties.

Randy Janinda key note - Risk Assessments of Vendors & Third Parties

Outsourcing business functions does not absolve you from the responsibility of protecting your information or your systems. Yet, as we have performed security evaluations on various vendors, large and small, we continually find 1) that they have limited experience with information security and 2) their current clients didn't ask the questions we are asking about encryption, data retention, access control, organizational security, etc. We'll share examples, stats and what worked (or didn't) as we implemented a program to assess risk with third-parties.

2012Wyn WilsonRapid7securitytechnologyITUNITED Security Summitkeynote