Attendees of this live webcast may be eligible for CPE credit.
Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk management (TPRM) processes and dedicated staff to evaluating the security postures of existing and potential third parties.
A six-phase third party risk management program lifecycle whose steps are critical to a successful third-party risk management program, including (supplier identification, classification, assessment, management, monitoring, and relationship termination)
A TPRM Standard
A TPRM Program Workbook (supplier inventory and automated security questionnaire)
Strategies for addressing new supplier threats and regulations