These days, with the number of vendors and other third parties putting their tentacles into your systems and networks, you can feel like you are fighting a multi-headed hydra in trying to limit third-party risk in your IT systems. In this talk, we will discuss the nature of this beast and how to tame it using best practices, technical controls, and good review processes. We will walk through a well-designed vendor management program, including inventorying, risk assessing, onboarding and offboarding processes, and audit procedures that will help you tame every hairy, scary vendor on your network so that their weakest links are not yours.
To learn more, download the webinar where we will discuss:
- How to tame the beast using best practices, technical controls, and good review processes
- Walk through a well-designed vendor management program
- Learn more about onboarding, audit processes, and more