Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Close Encounters of the Third (and Fourth) Party Kind Wade Baker, Partner, Cyentia Institute | Vanessa Sorenson, Sr. Product Marketing Manager, SecurityScorecard Mitigating risks between your third- and fourth-party vendors SecurityScorecard and the Cyentia Institute teamed up to analyze data from SecurityScor... February 21, 2023 4:30pm Fourth Parties And Beyond: Managing Risk In The Extended Supply Chain Andrew Moyad, CEO, Shared Assessments. John Bree, CRO, Supply Wisdom. Michelle Clement. Charles Forde, Nomura. Just as managing the risk of your direct suppliers is critical, understanding the risk of your suppliers' suppliers is imperative. While you may work ... 4 months ago | 63 mins Demo: Automatic Vendor Detection (AVD) Deep Dive Maya Kano, Solutions Architect; Vanessa Sorenson, Senior Product Marketing Manager Go beyond traditional TPRM to automate and scale your third-party and fourth-party risk management workflows. Join SecurityScorecard in this deep di... 3 months ago | 23 mins Demo: Third Party Risk Management Maya Kano, Solutions Architect As you continue to engage with vendors, security ratings can illuminate vulnerabilities in your third- and fourth- party ecosystem. Learn About: - Bu... 3 months ago | 27 mins Webinar: Monitor & Manage Supply Chain Risk Wes Loeffler, Product Manager, Archer & Mark Nafe, Director, Solutions Consulting, RiskRecon Today, the average cost of the fallout from a multi-party data breach is $90 million and it continues to rise. In addition, 59% of data breaches are d... 2 months ago | 56 mins Confident Data gives you Actionable Insights in our Q4 '22 Release Gian Calvesbert, Madelyn Maletz, Vanessa Sorenson, Megann Freston, Miryam Meir A resilient and trusted digital ecosystem is impossible to achieve without an agile security program. How can you gain unparalleled visibility, quanti... 2 months ago | 60 mins A Tangled Web of Risk: The Challenges of Cyber Resiliency in Today’s Reality Megan DeBlois, Principal Product Manager; Tim Gallo, Strategic Intelligence Architect Subsidiaries, suppliers and third- or fourth-party vendors from all business relationships are increasingly being targeted as initial compromise vecto... 3 months ago | 44 mins Auditing Fourth-Party Risk and Beyond Dawn Ward, Senior Solution Consultant, Iceberg Networks; Chris Murphey, VP Advisory Services, Iceberg Networks Organizations are already painfully aware of the consequences of the pandemic on their operations due to supply chain interruption. Gaps have been ide... 1 year ago | 31 mins Top Risk Management Lessons from the SolarWinds Hack Sam Abadir, Director of Industry Solutions, NAVEX Global | Blake Gardner, Third-Party Risk Manager, Crowe In December of last year there was a cyber-attack suspected to have been perpetrated by Russian hackers. The attack was traced back to a third party –... 2 years ago | 59 mins Align Internal Cybersecurity Practices with External Third-Party Risk Management Greg Rasner, Author | James Christiansen, VP and CSO, Netskope |Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity Cybersecurity risk continues to become more complex to manage. Today, it’s not enough to focus solely on the organization’s internal risk as control w... 1 year ago | 56 mins Load more