Not specifically to a single breach (we've all had them), but we do need to manage the risk associated with a supplier that does not perform consistently with safeguarding our sensitive information. We had definitely taken action against a supplier that has had an historical pattern of poor cyber hygiene and/or insufficient prioritization of protecting our sensitive data, identity, and/or accesses.
Content you might like
What are some best practices to follow when your organization is preparing to end a vendor relationship? What can you do to minimize the operational disruption that would result?
Do you use an ERM-system that also includes cyber security risk management? What tools or systems do you use?
When evaluating cybersecurity solutions, what's the most important non-technical criteria you consider? Has it changed in recent years?
To what extent do you agree or disagree with this statement: I'd prefer to leverage existing on-prem compliance, policies, controls and knowledge for cloud workloads over rebuilding security and compliance in the cloud.
Strongly Agree13%
Agree53%
Neutral21%
Disagree11%
Strongly Disagree
View Results
Are you worried about inference attacks on AI systems/LLMs in use at your organization?
Yes - very worried13%
Sort of worried61%
A bit worried19%
Nope - not worried at all 5%
What's an inference attack?1%
View Results
What sets us apart?
No selling.
No recruiting.
No self promotion.
Read Our GuidelinesTrusted peer advice and insights for technology professionals.
Not specifically to a single breach (we've all had them), but we do need to manage the risk associated with a supplier that does not perform consistently with safeguarding our sensitive information. We had definitely taken action against a supplier that has had an historical pattern of poor cyber hygiene and/or insufficient prioritization of protecting our sensitive data, identity, and/or accesses.