Read more
The book is essential reading for CISOs, DPOs, CPOs, Sourcing Managers, Vendor Risk Managers, Chief Procurement Officers, Cyber Risk Managers, Compliance Managers, and other cyber stakeholders, as well as students in cyber security.
List of contents
Part I: The Case for Supply Chain Cyber Risk Management, 1: The Extended Enterprise, 2: Know Your Supply Chain, 3: Notable Supply Chain Cyber Events, 4: Challenges in Vendor Cyber Risk Management, Part II: Vendor Cyber Risk Management- Regulations and Compliance, 5: Vendor Cybersecurity Regulations, 6: HIPAA and Vendor Cyber Risk Management, 7: General Data Protection Regulation (GDPR), 8: California Consumer Privacy Act (CCPA), 9: New York State Department of Financial Services (NYDFS) Part 500, 10: Defense Federal Acquisition Regulation Supplement (DFARS), 11: Frameworks and Certifications,12: Attestations and Assessment Utilities, 13: SOC 2 Report, Part III: Building the Vendor Cyber Risk Management Program, 14: Preparation, 15: Due Diligence, 16: Risk Assessments, 17: Vendor Risk Quantification, 18: The Role of Policy & Procedure, 19: Internal Audit, 20: Third-Party Vendor Audit, Part IV: Future Perspectives in Vendor Cyber Risk Management, 21: The Way Forward
About the author
Ariel Evans is a senior cybersecurity expert, serial entrepreneur, and award-winning author. She is the chairperson of the cybersecurity continuing education programs at Seton Hall University and Pace University and has been on the front lines of cybersecurity as a former CISO, and Cyber Risk Manager.
Ajay Singh is a Professor of Practice, corporate advisor, Fellow at the Institute of Directors, Former CEO, and award-winning author.
Alex Golbin is a Senior Financial Services Executive with over two decades of leading Risk Management, Enterprise Resiliency, Operations and Technology Transformation, Global Technology, Business Process Improvement, and leveraging state-of-the-art technology.
Summary
The book is essential reading for CISOs, DPOs, CPOs, Sourcing Managers, Vendor Risk Managers, Chief Procurement Officers, Cyber Risk Managers, Compliance Managers, and other cyber stakeholders, as well as students in cyber security.