Taming the Third-Party Risk Beast

Logo
Presented by

Tony Howlett, SecureLink's Previous CISO

About this talk

These days, with the number of vendors and other third parties putting their tentacles into your systems and networks, you can feel like you are fighting a multi-headed hydra in trying to limit third-party risk in your IT systems. In this talk, we will discuss the nature of this beast and how to tame it using best practices, technical controls, and good review processes. We will walk through a well-designed vendor management program, including inventorying, risk assessing, onboarding and offboarding processes, and audit procedures that will help you tame every hairy, scary vendor on your network so that their weakest links are not yours. To learn more, download the webinar where we will discuss: - How to tame the beast using best practices, technical controls, and good review processes - Walk through a well-designed vendor management program - Learn more about onboarding, audit processes, and more

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (62)
Subscribers (1799)
Over the past two decades, we have become the leading experts in critical access management for highly regulated enterprise organizations, technology vendors, healthcare providers, and more. Organizations of varying industries and needs continue to depend on SecureLink to secure access to their critical systems, data, IT and OT infrastructure, regulated information, and networks. Our value is more than world-class products — it’s our partnerships with every organization we work with. We understand technology, security, industries, and the vast cyber threats our customers face. We’re here to stand beside them and keep them secure.