This webcast aired on May 3, 2022.
CPE Credit(s): 1
Throughout your organization, people are managing silos of risk to your business. How can you connect the dots and gain visibility into your overall cyber risk? Today, it’s more important than ever to be effective in identifying where your weaknesses lie—both inside and outside your organization.
Join Greg Rasner and ProcessUnity for a discussion on how to build a third-party risk management program with cybersecurity risk at the forefront. From intake assessments, physical validation of security controls, and continuous monitoring of vendor risk, the session will cover one of the more important topics challenging almost every organization today.
Attendees will learn:
- Key pillars of effective third-party assessment and monitoring.
- How to conduct robust intake and ongoing due diligence.
- How to continuously monitor your third-party vendors and prevent breaches.
- Steps to secure your software supply chain.
Greg Rasner, Author, “Cybersecurity & Third-Party Risk”