To view this email as a web page, click here
 

Tomorrow: March 7th at 2pm ET / 11am PT

Attendees of this live webcast may be eligible for CPE credit.
 

Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk management (TPRM) processes and dedicated staff to evaluating the security postures of existing and potential third parties.

Tomorrow at 2pm learn from our panelists as they share their experiences dealing with managing security risks in third party software and services. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting:

  • A six-phase third party risk management program lifecycle whose steps are critical to a successful third-party risk management program, including (supplier identification, classification, assessment, management, monitoring, and relationship termination)
  • A TPRM Standard
  • A TPRM Program Workbook (supplier inventory and automated security questionnaire)
  • Strategies for addressing new supplier threats and regulations
 
 

Can’t attend live? Sign up anyway and we’ll send you a link to the webcast recording when it becomes available.

 
 
SC Stories webcasts offer programs with leading IT security vendors moderated by CyberRisk Alliance editorial staff.

Attendees may be eligible to receive 1 CPE credit for each one-hour webcast they attend, subject to their respective industry association’s approval.

Unsubscribe here
View Privacy Policy and Terms of Service
You are subscribed as: newsletter@newslettercollector.com
© 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017
..