TPSRM Fundamentals 2: Best Practices for Third-Party Security Risk Management

Logo
Presented by

Demi Ben-Ari, Co-Founder and CTO, Panorays | Dov Goldman, Director of Risk & Compliance, Panorays

About this talk

If you are involved with InfoSec, IT risk or supply chain management, then you know that the key to minimizing your risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process. You might even know some of the basics of risk assessments, but you’re not sure how to take that knowledge to the next level. What are your next steps? Demi Ben-Ari and Dov Goldman will show you the ins and outs of third-party security risk management in this second webinar of the TPSRM Fundamentals series. Here’s what you’ll learn: - How to create security questionnaires that consider inherent risk - How to scope questionnaires according to activity, control mapping and the standards of control sets - How automation helps with third-party security risk management Learn the ropes and start building a TPSRM program for your organization.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (16)
Subscribers (868)
Panorays is dedicated to eliminating third-party cyber risk so that companies worldwide can quickly and securely do business together. We automate, accelerate and scale the third-party security evaluation and management process so you can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance and improve your security across the board. Join us as we explore the risk inherent to your digital supply chain and discuss the transformation needed for modern day third-party security risk management—from automating security questionnaires, assessing third parties’ external attack surfaces, considering the criticality of the business relationship and more.