This item qualifies for
CPE credit(s) accredited by GRC Certify
if you watch it from beginning to end. Credit is automatically tracked to your certifications and recorded on
your CPE Transcript.
CPE Qualification: CPE tracking is disabled for your account.
In order to automatically receive CPE credits, you must enable VIP Autopay in your account settings.
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last...
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last year alone and it is estimated that two thirds of those attacks were perpetrated on and through third parties handling company or customer data.
Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this webinar, we defi ne the key steps of the process and identify what the future holds for third party information security management.
Learning Objectives:
Illustrate the key steps critical to establishing strong third party infosecDefine benefits of applying modern technologies to manage this riskDiscuss ways to begin assessing and improving existing processes
Speakers:
Dov Goldman,VP Innovation and Alliances, HiperosSteven Minsky, CEO, LogicManager, Inc.Adam Schrock, Managing Director, Risk Advisory Services, Grant Thornton