InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Checking the Boxes on Vendor Cybersecurity Assessments

Presented by

Seth Bailey (VP, Information Security @ Iron Mountain) | Jenna Wells (Director, 3rd Party Risk Management @ Iron Mountain)

About this talk

With more sophisticated cyber attacks targeting small and midsized organizations, larger enterprises are now requiring data security assessments prior to doing business. How do you know if you can check the boxes of a 3rd party cybersecurity assessment? Iron Mountain's VP of Information Security, Seth Bailey, and Jenna Wells, Director of Third Party Risk Management together break down typical assessment requirements, and how small and midsized organizations can proactively prepare for one. Hosted by Rob Simopoulos, Co-Founder of Defendify, you will also learn when to expect a 3rd party cybersecurity assessment, and how you can check your own vendor's cybersecurity posture. Key takeaways include: • What a 3rd party cybersecurity assessment is, and when can you expect to get one • What steps can small and midsized organizations take to prepare for 3rd party cybersecurity assessments • How to assess the strength your vendors’ cybersecurity to ensure your data won’t risk a compromise
Cybersecurity T@LKS

Cybersecurity T@LKS

670 subscribers18 talks
Strengthening cybersecurity without the complexity
Cyber threats are evolving everyday BUT having a strong and comprehensive cybersecurity posture doesn't have to be complicated. Defendify hosts a range of cybersecurity experts from government agencies, big and small business, legal firms, non-profit organizations and more - all who share their experienced approach to how to achieve an ongoing, robust cybersecurity program.
Related topics