The Challenge of Third Party InfoSec Risk
This event does not qualify for CPE credits
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last...
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last year alone and it is estimated that two thirds of those attacks were perpetrated on and through third parties handling company or customer data.
Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this webinar, we defi ne the key steps of the process and identify what the future holds for third party information security management.
Learning Objectives:
Illustrate the key steps critical to establishing strong third party infosecDefine benefits of applying modern technologies to manage this riskDiscuss ways to begin assessing and improving existing processes
Speakers:
Dov Goldman,VP Innovation and Alliances, HiperosSteven Minsky, CEO, LogicManager, Inc.Adam Schrock, Managing Director, Risk Advisory Services, Grant Thornton