Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear understanding of the risks inherent in their business relationships with third parties. How should you approach managing third party risk?

Wayne Tufek (Frequent speaker at RSA Conference) will be joining us to discuss the topic

>> Register here to join us here

What Will You Learn ?

-Discuss the major failings of traditional third party risk management programs
-Creating a supply chain awareness program
-Creating a comprehensive catalogue of vendors and suppliers
-Risk based segmentation of identified vendors and suppliers
-Risk assessment and rules based due diligence activities
-The key contractual clauses all contracts with third parties should contain and why
-Methods for continuous monitoring
-How to develop and present a supplier risk dashboard for management
-A model for a comprehensive process to effectively and efficiently manage third party risk

>> Register here to join us here

E-mail me when people leave their comments –

CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)

CISO Discussion Conference

  • Description:

    The sessions will explain the Security Market Ecosystem, Problems that CISOs face when trying to purchase a product in that segment, the architecture, business impact & more.

  • Created by: pritha