Presenter Photo

Often the weak link in the security chain, remote access by third party vendors and contractors requires controlled network separation and activity monitoring. In fact, many recent, high-profile data breaches have occurred due to attacks originating from third-party vendors.

Dave Shackleford, SANS Instructor & Founder of Voodoo Security, gives tips on how to mitigate that risk – with a focus on secure connection gateways, proxied access, and auditing and recording of the third-party session.