Third-Party Risk Management: How to Evolve a Program
With third-party-sourced breaches regularly making the headlines, most companies have become aware of the risks created by this extended attack surface - often because they have been victims themselves. By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties.
See Also: Expel: Firms Still Threatened by Old Vulnerabilities
The session will cover:
- How third-party risk environment has evolved
- What is needed for an effective risk management program
- The challenges of implementing third-party risk program