Hananel Livneh, Adaptive Shield; Alastair Parr, Prevalent; Matt Bianchi, ProcessUnity; and Shea Hanson, OneTrust.
The cyber threat landscape grows exponentially each year. Third-party cyber data breaches like the Kaseya data breach, a cyberattack that affected over 1,500 organizations, have prompted regulators to raise cybersecurity standards. In the United States, the Biden Administration aims to improve nationwide cybersecurity with an executive order. The 100-day plan aims to modernize federal infrastructure, improve supply chain security, establish a cybersecurity review board and more.
Gaining visibility into the security risks your supply chain or third-party vendors pose to your organization is a necessity among cybersecurity leaders. Next-generation cybersecurity practices will require organizations to align both internal and external cybersecurity risk processes to create a standardized process to facilitate effective third-party cyber risk mitigation. On this webinar as we explore the intersection of third-party risk management and cybersecurity best practices. We’ll review new strategies and outline the steps to mature your program, and you will learn how to:
∙ Map external third-party risk to internal cybersecurity controls,
∙ Evaluate control effectiveness internally and externally to track issues over time and stay ahead of future incidents,
∙ Prioritize third-party risk projects based on control gaps and domain inefficiencies,
∙ Build a cybersecurity program that protects against internal and external threats.