Best practices and tools developed by a cross sector task force of CISOs - Save your seat now! To view this email as a web page,
click here | | | DATE: March 7, 2024 TIME: 2:00 PM EDT |
| Third parties, whether they provide software or services to an organization, can introduce significant security risks, including ransomware, software vulnerabilities, loss of services, and breaches of confidential information. For this reason, companies have established third party risk management (TPRM) processes and dedicated staff to evaluating the security postures of existing and potential third parties. In this CISO Stories webinar, panelists share their experiences dealing with managing security risks in third party software and services. They will also discuss best practices and tools developed by a cross sector task force of CISOs, highlighting: | A six-phase third party risk management program lifecycle whose steps are critical to a successful third-party risk management program, including (supplier identification, classification, assessment, management, monitoring, and relationship termination) A TPRM Standard A TPRM Program Workbook (supplier inventory and automated security questionnaire) Strategies for addressing new supplier threats and regulations |
| | | |
| | |
|
..