Training

Events

Third-Party Risk Management: How to Evolve a Program

Third-Party Risk Management: How to Evolve a Program

With third-party-sourced breaches regularly making the headlines, most companies have become aware of the risks created by this extended attack surface - often because they have been victims themselves. By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties.

See Also: Expel: Firms Still Threatened by Old Vulnerabilities

The session will cover:

  • How third-party risk environment has evolved
  • What is needed for an effective risk management program
  • The challenges of implementing third-party risk program

Webinar Registration

Premium Members Only

OnDemand access to this webinar is restricted to Premium Members.

Join Now to Access
Have an account? Sign in.


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.