A Third-Party Risk Management Implementation Guide and Toolkit - Register Now! To view this email as a web page,
click here | | | DATE: March 7, 2024 TIME: 2:00 PM EDT |
| Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk management (TPRM) processes and dedicated staff to evaluating the security postures of existing and potential third parties. In this CISO Stories webinar, panelists share their experiences dealing with managing security risks in third party software and services. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting: | A six-phase third party risk management program lifecycle whose steps are critical to a successful third-party risk management program, including (supplier identification, classification, assessment, management, monitoring, and relationship termination) A TPRM Standard A TPRM Program Workbook (supplier inventory and automated security questionnaire) Strategies for addressing new supplier threats and regulations |
| | | |
| | | CISO Stories webcasts offer programs with leading IT security vendors moderated by CyberRisk Alliance editorial staff. | View Privacy Policy and Terms and Conditions You are subscribed as: newsletter@newslettercollector.com Unsubscribe here © 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017 |
|
|
|
..