How to Build a Program to Manage Your Third Parties and Supply Chain

Logo
Presented by

Dov Goldman, Heath Renfrow, Raef Meeuwisse

About this talk

Learn how to scale an actionable third-party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture. Perform third-party evaluations based on the inherent risk or criticality of each relationship Achieve transparency into third parties’ security practices Implement compensating internal controls when the third parties don’t have or will not reveal their own Collaborate with third parties to ensure success in the remediation process

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (12)
Subscribers (587)
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.