3rd Party Risk Management , Governance & Risk Management

OnDemand Webinar | Changing the Conversation Around Third-Party Risk Management

Developing Processes to Identify Financial, Security, Contractual Risk Related to Third Parties.

So, you've managed to turn the enterprise defence conversation from the topic of "security" to the more appropriate topic of "risk".

See Also: Evaluating and Reducing Supply Chain Risk

But are you prepared to have this discussion in the case of an event that involves a third-party vendor, supplier, partner or connected service? Have you inventoried and ranked these third parties relating to criticality and the role they represent within your own line of business? Can you ensure third-party alignment to your own event protocols?

If you are looking for new strategies and solutions to help answer these questions, this webinar will offer insights on organisations change their digital risk management conversation.

View this webinar and you will learn how to:

  • Develop processes to identify risk (financial viability, security or contractual) related to third parties;
  • Monitor those connection points to third parties to identify potential threats;
  • Strengthen third-party governance maturity.

About the Author

Information Security Media Group

Information Security Media Group (ISMG) is the world's largest media company devoted to information security and risk management. Each of its 34 media sites provides relevant education, research and news that is specifically tailored to key vertical sectors including banking, healthcare and the public sector; geographies from North America to Southeast Asia; and topics such as data breach prevention, cyber risk assessment and fraud. Its yearly global summit series connects senior security professionals with industry thought leaders to find actionable solutions for pressing cybersecurity challenges.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.