U.S. Customs Officials Confirm Traveler Photos Compromised As Part Of A Major Hack

Vendor Management or Third Party Vendor Assessments. You have to review who you are doing business with, what business practices do your subcontractors exercise. At the end of the day it is your organizations name that will be plastered on the news. Begin with a minimum security standards survey that you have all vendor partners go through.

https://www.forbes.com/sites/kateoflahertyuk/2019/06/11/u-s-customs-officials-confirm-traveler-photos-compromised-as-part-of-a-major-hack/?ss=cybersecurity#6d85161913ab

Avatar

Author: C. Stokes

Mr. Stokes is currently the Chief Information Security Officer for Florida A&M University. He has over 25 years of industry expertise with a depth of experience and strong performance results in a variety of business leadership/management and information security management roles. With strong analytical skills and the ability to clearly structure complex situations, he develops and delivers solutions.

Leave a Reply

Your email address will not be published. Required fields are marked *