Panel: Third-Party Risk Management: How to Evolve a Program
With breaches involving third-party vendors regularly making the headlines, most companies have become aware of the risks created by this extended attack surface — often because they have been victims themselves. By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties.
See Also: How to Take the Complexity Out of Cybersecurity
This session will cover:
- How third-party risk environment has evolved
- What is needed for an effective risk management program
- The challenges of implementing a third-party risk management program