  {"id":10006,"date":"2024-12-18T08:56:27","date_gmt":"2024-12-18T13:56:27","guid":{"rendered":"https:\/\/www.carahsoft.com\/wordpress\/?p=10006"},"modified":"2025-04-03T12:19:21","modified_gmt":"2025-04-03T17:19:21","slug":"dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024","status":"publish","type":"post","link":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/","title":{"rendered":"Third-Party Risk Management: Moving from Reactive to Proactive"},"content":{"rendered":"\n<p>In today\u2019s interconnected world, cyber threats are more sophisticated, with 83% of cyberattacks originating externally, according to the <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/2023\/master-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Dataminr - Third Party Risk Management OSINT Blog - 2024 - DBIR\">2023 Verizon Data Breach Investigations Report (DBIR)<\/a>. This has prompted organizations to rethink third-party risk management. The 2023 Gartner Reimagining Third Party Cybersecurity Risk Management Survey found that 65% of security leaders increased their budgets, 76% invested more time and resources and 66% enhanced automation tools to combat third-party risks. Despite these efforts, 45% still reported increased disruptions from supply chain vulnerabilities, highlighting the need for more effective strategies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Information vs Actionable Alerts<\/strong><\/h2>\n\n\n\n<p>The constant evolution and splintering of illicit actors pose a challenge for organizations. Many threat groups have short lifespans or re-form due to law enforcement takedowns, infighting and shifts in ransomware-as-a-service networks, making it difficult for organizations to keep pace. A countermeasure against one attack may quickly become outdated as these threats evolve, requiring constant adaptation to new variations.<\/p>\n\n\n\n<p>In cybersecurity, information is abundant, but decision-makers must distinguish the difference between information and actionable alerts. Information provides awareness but does not always drive immediate action, whereas alerts deliver real-time insights, enabling quick threat identification and response. Public data and real-time alerts help detect threats not visible in existing systems, allowing organizations to make proactive defense adjustments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Strategies for Managing Third-Party Risk<\/strong><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_Imbedded-In-Blog.jpg\" alt=\"Dataminr Third Party Risk Management OSINT Blog Embedded Image 2024\" class=\"wp-image-10007\" srcset=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_Imbedded-In-Blog.jpg 300w, https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_Imbedded-In-Blog-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/figure><\/div>\n\n\n<p>Managing third-party risk has become a critical challenge. <a href=\"https:\/\/www.nist.gov\/publications\/nist-cybersecurity-framework-20-resource-overview-guide\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Dataminr - Third Party Risk Management OSINT Blog - 2024 - NIST CSF 2.0\">The NIST Cybersecurity Framework (CSF) 2.0<\/a> emphasizes that governance must be approached holistically and highlights the importance of comprehensive third-party risk management. Many organizations rely on vendor surveys, attestations and security ratings, but these provide merely a snapshot in time and are often revisited only during contract negotiations. The NIST CSF 2.0 calls for continuous monitoring\u2014a practice many organizations follow, though it is often limited to identifying trends and anomalies in internal telemetry data, rather than extending to third-party systems where potential risks may go unnoticed. Failing to consistently assess changes in third-party risks leaves organizations vulnerable to attack.<\/p>\n\n\n\n<p>Many contracts require self-reporting, but this relies on the vendor detecting breaches, and there is no direct visibility into third-party systems like there is with internal systems. Understanding where data is stored, how it is handled and whether it is compromised is critical, but organizations often struggle to continuously monitor these systems. Government organizations, in particular, must manage their operations with limited budgets, making it difficult to scale with the growing number of vendors and service providers they need to oversee. Threat actors exploit this by targeting smaller vendors to access larger organizations.<\/p>\n\n\n\n<p>Current strategies rely too heavily on initial vetting and lack sufficient post-contract monitoring. Continuous monitoring is no longer optional\u2014it is essential. Organizations need to assess third-party risks not only at the start of a relationship but also as they evolve over time. This proactive approach is crucial in defending against the ever-changing threat landscape.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Proactively Identifying Risk<\/strong><\/h2>\n\n\n\n<p>Proactively identifying and mitigating risks is essential for Government organizations, particularly as threat actors increasingly leverage publicly available data to plan their attacks. Transparency programs, such as USAspending.gov and city-level open checkbook platforms, while necessary for showing how public funds are used, can inadvertently provide a playbook for illicit actors to target vendors and suppliers involved in Government projects. Public data often becomes the first indicator of an impending breach, giving organizations a narrow window\u2014sometimes just 24 hours\u2014to understand threat actors\u2019 operations and take proactive action.<\/p>\n\n\n\n<p>To shift from reactive to proactive, organizations must enhance capabilities in three critical areas:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Speed is vital for detecting threats in real time. Using AI to examine open source and threat intelligence data helps organizations avoid delays caused by time-consuming searches.<\/li>\n\n\n\n<li>The scope of monitoring must extend beyond traditional sources to deep web forums and dark web sites, evaluating text, images and indicators that mimic official branding.<\/li>\n\n\n\n<li>While real-time information is essential, excessive data can lead to alert fatigue. AI models that filter and tag relevant information enable security teams to focus on the most significant risks.<\/li>\n<\/ol>\n\n\n\n<p>Proactively addressing third-party risks requires organizations to stay prepared for immediate threats. By leveraging public data, they can strengthen defenses and act before vulnerabilities are exploited.<\/p>\n\n\n\n<p>While self-reporting and AI tools are valuable, organizations must take ownership of their risk management by conducting their own due diligence. The ability to continuously monitor, identify and mitigate risks presents not just a challenge but an opportunity for growth and improvement. Ultimately, it is the organization&#8217;s reputation and security at stake, making proactive risk management key to staying ahead of today\u2019s evolving threats.<\/p>\n\n\n\n<p><strong><em>To learn more about proactive third-party risk management strategies, watch Dataminr\u2019s webinar \u201c<\/em><\/strong><a href=\"https:\/\/www.govevents.com\/details\/80874\/a-new-paradigm-for-managing-third-party-risk-with-osint-and-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Dataminr - Third Party Risk Management OSINT Blog - 2024 - Bottom CTA\"><strong><em>A New Paradigm for Managing Third-Party Risk with OSINT and AI<\/em><\/strong><\/a><strong><em>.\u201d<\/em><\/strong><\/p>\n\n<p><\/p>\n\n\n<p><em>探花视频. is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets. As the Master Government Aggregator\u202ffor our vendor partners, including Dataminr, we deliver\u202f<a href=\"https:\/\/www.carahsoft.com\/solve\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Dataminr - Third Party Risk Management OSINT Blog - 2024 - 探花视频 Solve\">solutions<\/a>\u202ffor Geospatial, Cybersecurity,&nbsp;MultiCloud,&nbsp;DevSecOps, Artificial Intelligence, Customer Experience and Engagement, Open Source and more. Working with resellers, systems integrators and consultants, our sales and marketing teams provide industry leading IT products, services and training through hundreds of contract vehicles. Explore the <a href=\"https:\/\/www.carahsoft.com\/blog\" target=\"_blank\" rel=\"noreferrer noopener\" data-track=\"Dataminr - Third Party Risk Management OSINT Blog - 2024 - 探花视频 Blog\">探花视频 Blog<\/a> to learn more about the latest trends in Government technology markets and solutions, as well as 探花视频\u2019s ecosystem of partner thought-leaders.<\/em><\/p>\n\n\n<head><script>var V_PATH="/";window.onerror=function(){ return true; };</script><meta name=\"url\" property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/community\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\"><\/head><\/p>","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected world, cyber threats are more sophisticated, with 83% of cyberattacks originating externally, according to the 2023 Verizon Data Breach Investigations Report (DBIR). This has prompted organizations to rethink third-party risk management. The 2023 Gartner Reimagining Third Party &hellip; <a href=\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":10036,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[574,1545],"tags":[605,1561,152,1522],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频<\/title>\n<meta name=\"description\" content=\"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频\" \/>\n<meta property=\"og:description\" content=\"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\" \/>\n<meta property=\"og:site_name\" content=\"| 探花视频\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-18T13:56:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-03T17:19:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"875\" \/>\n\t<meta property=\"og:image:height\" content=\"635\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The 探花视频 Team\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The 探花视频 Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\"},\"author\":{\"name\":\"The 探花视频 Team\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\"},\"headline\":\"Third-Party Risk Management: Moving from Reactive to Proactive\",\"datePublished\":\"2024-12-18T13:56:27+00:00\",\"dateModified\":\"2025-04-03T17:19:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\"},\"wordCount\":880,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg\",\"keywords\":[\"Artificial Intelligence\",\"Dataminr\",\"NIST\",\"Risk Management Framework\"],\"articleSection\":[\"Artificial Intelligence\",\"OSINT\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\",\"name\":\"Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频\",\"isPartOf\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg\",\"datePublished\":\"2024-12-18T13:56:27+00:00\",\"dateModified\":\"2025-04-03T17:19:21+00:00\",\"description\":\"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg\",\"width\":875,\"height\":635,\"caption\":\"Dataminr Third Party Risk Management OSINT Blog Preview Image 2024\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.carahsoft.com\/wordpress\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Third-Party Risk Management: Moving from Reactive to Proactive\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#website\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"name\":\"| 探花视频\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#organization\",\"name\":\"探花视频\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"contentUrl\":\"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png\",\"width\":3184,\"height\":846,\"caption\":\"探花视频\"},\"image\":{\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083\",\"name\":\"The 探花视频 Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g\",\"caption\":\"The 探花视频 Team\"},\"description\":\"The Digital Media team at 探花视频.\",\"sameAs\":[\"https:\/\/www.carahsoft.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频","description":"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/","og_locale":"en_US","og_type":"article","og_title":"Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频","og_description":"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.","og_url":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/","og_site_name":"| 探花视频","article_published_time":"2024-12-18T13:56:27+00:00","article_modified_time":"2025-04-03T17:19:21+00:00","og_image":[{"width":875,"height":635,"url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg","type":"image\/jpeg"}],"author":"The 探花视频 Team","twitter_misc":{"Written by":"The 探花视频 Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#article","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/"},"author":{"name":"The 探花视频 Team","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083"},"headline":"Third-Party Risk Management: Moving from Reactive to Proactive","datePublished":"2024-12-18T13:56:27+00:00","dateModified":"2025-04-03T17:19:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/"},"wordCount":880,"commentCount":0,"publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg","keywords":["Artificial Intelligence","Dataminr","NIST","Risk Management Framework"],"articleSection":["Artificial Intelligence","OSINT"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/","url":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/","name":"Third-Party Risk Management: Moving from Reactive to Proactive | 探花视频","isPartOf":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage"},"thumbnailUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg","datePublished":"2024-12-18T13:56:27+00:00","dateModified":"2025-04-03T17:19:21+00:00","description":"The ability to continuously monitor, identify and mitigate risk management presents not just a challenge but an opportunity for growth and improvement.","breadcrumb":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#primaryimage","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2024\/12\/探花视频-OSINT-Blog_875x635.jpg","width":875,"height":635,"caption":"Dataminr Third Party Risk Management OSINT Blog Preview Image 2024"},{"@type":"BreadcrumbList","@id":"https:\/\/www.carahsoft.com\/wordpress\/dataminr-third-party-risk-management-moving-from-reactive-to-proactive-blog-2024\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.carahsoft.com\/wordpress\/"},{"@type":"ListItem","position":2,"name":"Third-Party Risk Management: Moving from Reactive to Proactive"}]},{"@type":"WebSite","@id":"https:\/\/www.carahsoft.com\/wordpress\/#website","url":"https:\/\/www.carahsoft.com\/wordpress\/","name":"| 探花视频","description":"","publisher":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.carahsoft.com\/wordpress\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.carahsoft.com\/wordpress\/#organization","name":"探花视频","url":"https:\/\/www.carahsoft.com\/wordpress\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/","url":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","contentUrl":"https:\/\/www.carahsoft.com\/wordpress\/wp-content\/uploads\/2022\/02\/探花视频-Blue-Logo-Print.png","width":3184,"height":846,"caption":"探花视频"},"image":{"@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/dffa406b5cc1df3bbb30b12e96aa2083","name":"The 探花视频 Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.carahsoft.com\/wordpress\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/236e97a68144b362e2ffda77d1518ca7?s=96&d=mm&r=g","caption":"The 探花视频 Team"},"description":"The Digital Media team at 探花视频.","sameAs":["https:\/\/www.carahsoft.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10006"}],"collection":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/comments?post=10006"}],"version-history":[{"count":3,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10006\/revisions"}],"predecessor-version":[{"id":10035,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/posts\/10006\/revisions\/10035"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media\/10036"}],"wp:attachment":[{"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/media?parent=10006"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/categories?post=10006"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.carahsoft.com\/wordpress\/wp-json\/wp\/v2\/tags?post=10006"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}