You are currently focusing on the certification. Go to program dashboard.
CPE Qualification: GRCA , GRCP
This item qualifies for CPE credit(s) accredited by GRC Certify if you watch it from beginning to end. Credit is automatically tracked to your certifications and recorded on your CPE Transcript.
CPE Qualification: CPE tracking is disabled for your account.
In order to automatically receive CPE credits, you must enable VIP Autopay in your account settings.
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last...
The problem of ensuring information security has become ever more challenging as both volume of information and use of third parties who touch critical information has grown. Cyber attacks are said to have cost businesses more than $400 billion last year alone and it is estimated that two thirds of those attacks were perpetrated on and through third parties handling company or customer data.
Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this webinar, we defi ne the key steps of the process and identify what the future holds for third party information security management.
Learning Objectives:
Illustrate the key steps critical to establishing strong third party infosecDefine benefits of applying modern technologies to manage this riskDiscuss ways to begin assessing and improving existing processes
Speakers:
Dov Goldman,VP Innovation and Alliances, HiperosSteven Minsky, CEO, LogicManager, Inc.Adam Schrock, Managing Director, Risk Advisory Services, Grant Thornton
Information & Billing
+1 (602) 234-9278
Principled Performance, Driving Principled Performance, Putting Principles Into Practice, OCEG, GRC360°, ActiveLearning, EventDay and LeanGRC are registered trademarks of OCEG.
Protector Skillset, Protector Mindset, Protector Code, Lines of Accountability, GRC Professional, GRCP, GRC Fundamentals, GRC Auditor, GRCA, GRC Audit Fundamentals, Data Privacy Fundamentals, Integrated Data Privacy Professional, IDPP, Policy Management Fundamentals, Integrated Policy Management Professional, IPMP, Integrated Audit & Assurance Professional, IAAP, Integrated Governance & Oversight Professional, IGOP, Integrated Strategy & Performance Professional, ISPP, Integrated Risk Management Professional, IRMP, Integrated Decision Management Professional, IDMP, Integrated Compliance & Ethics Professional, ICEP, Integrated Business Continuity Professional, IBCP, Integrated Information Security Professional, IISP are trademarks of OCEG.