InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

What Does Construction Have to Do with Third-Party Security? You’d Be Surprised

Presented by

Dov Goldman, Director of Risk & Compliance, Panorays | Andy Black, Head of Compliance & Info Sec., Sir Robert McAlpine

About this talk

In today’s cyber world, you know that third-party security is necessary for all industries–even construction. But implementing a process that thoroughly addresses vendor security risk can be challenging, especially when performed manually. In this webinar, you’ll learn how Sir Robert McAlpine, a UK-based construction and civil engineering company, succeeded in creating an automated, efficient third-party security process. You will learn how to: • Identify gaps in its third-party security risk management process • Set goals and requirements for the process, including easy collaboration, speed, cost-effectiveness and cyber risk visibility • Transition to a mature third-party security process If your organization is looking to create a third-party security risk management process, this webinar is for you!
Panorays

Panorays

2136 subscribers23 talks
Automate, Accelerate and Scale Your Third-Party Security Management
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.
Related topics