How to Build a Program to Manage Your Third Parties and Supply Chain

Logo
Presented by

Moderator: Dan Raywood - Speakers: Dov Goldman, Heath Renfrow, Raef Meeuwisse

About this talk

Management of third parties – be they suppliers, vendors, providers or business partners – now needs to be an essential element of a company’s cybersecurity strategy. However, many companies do not know how to assess these suppliers, or what assessing a supplier actually involves. In this webinar, we will look at how to scale an actionable third party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture. Key takeaways: How to do supplier evaluation based on the inherent risk or criticality of each relationship Achieve transparency into suppliers’ security practices How to implement compensating internal controls when the suppliers don't have or will not reveal their own How to collaborate with suppliers to ensure success in the remediation process Be able to create KPIs to help manage, improve the process and demonstrate achievements
Related topics:

More from this channel

Upcoming talks (17)
On-demand talks (580)
Subscribers (44077)
Dedicated to serving the information security community, in person, in print and online.