Greg Rasner, Author | James Christiansen, VP and CSO, Netskope |Andrew Egoroff, Senior Cybersecurity Specialist, ProcessUnity
Cybersecurity risk continues to become more complex to manage. Today, it’s not enough to focus solely on the organization’s internal risk as control weaknesses and gaps in the organization’s business partners could ultimately lead to failure. Next-generation cybersecurity practices require organizations to align internal and external cybersecurity risk processes. Integrating third-party risk management with cybersecurity program is the foundation for successful cybersecurity program management.
Join our live expert panel to learn more about the intersection of third-party risk management and internal cybersecurity practices.
We’ll review new strategies and outline the steps to mature your program. You will learn how to:
∙ Map external third-party risk to internal cybersecurity controls
∙ Evaluate control effectiveness against both internal and external risks
∙ Identify potential fourth-party risk
∙ Prioritize cyber/third-party risk projects based on control gaps and domain inefficiencies
∙ Build a united cybersecurity program that protects against internal and external threats