Third Party Risk Management: How to Conduct a High-Quality Virtual Assessment

Presented by

Drew Wilkinson, VP of Customer Success for SecurityScorecard & Jill Czerwinski, Partner, Crowe

About this talk

Everyone around the globe is responding to an unfamiliar market landscape where business continuity plans are being tested and stressed. For security teams trying to keep up with not only their own rapidly shifting environment but that of their vendors, third party risk management adds additional layers of complexity. Questions like: Is my supplier capable of delivering what we need? Do their cybersecurity management capabilities remain sound? Should we bring on new vendors to safeguard us against any points of failure? In a time where speed is critical and standard operating procedures seem null and void, SecurityScorecard and Crowe will speak to how you can handle vendor assessments online, in a comprehensive manner with confidence. They’ll share how they’ve seen companies pivot and adapt to newly crafted best practices for the current operating environment. Our speakers are veteran subject matter experts in Third Party Risk, Information Security and Data Privacy and have 40+ years of combined industry experience. ` In this session you will learn: •The benefits and disadvantages of virtual assessments •How to conduct a comprehensive virtual assessment with a fully remote process and framework •What pitfalls to avoid in order to ensure a high-quality virtual assessment

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (126)
Subscribers (20374)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user