Success Patterns for Supply Chain Security

Length: 1 hour

Supply chain attacks are on the rise, resulting in high financial impact for organizations. Learn the key processes, skills and technologies to prevent them. 

You’re Bleeding. Exposing the Attack Surface in Your Supply Chain

Length: 1 hour

Security professionals are responsible for safeguarding company data and assets, but often lack adequate visibility. Learn how to unveil your supply chain’s attack surface. 

The Guide to Managing the Security of Your SaaS and Cloud Providers

Length: 1 hour

The security management of your SaaS and cloud providers is an essential element of a company’s cybersecurity strategy. Learn how to accomplish this. 

Taking Your Third-Party Security Program to the Next Level

Length: 50 Minutes

Learn how to upgrade your third-party security program by scaling it effectively, continuously monitoring suppliers and ensuring that the program becomes the company-wide standard throughout the relationship lifecycle.

how to manage third parties webinar

How to Build a Program to Manage Your Third Parties and Supply Chain

Length: 60 minutes

Learn how to scale an actionable third-party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture.

Navigating 2020’s Data Privacy Regulations

Length: 40 minutes

Many organizations are struggling to keep up with an onslaught of significant regulations like GDPR, CCPA, the New York Shield Act and more. Some of this legislation appears to overlap, while some seems to be contradictory. How can organizations sort out this tangled regulatory web?

Context: The Missing Element in Your Third-Party Security Program

Length: 1 hour

Your third-party security program involves 3 stakeholders: the business owner, you as the representative of the security and risk team and the vendor itself. Each party has its own needs, which introduces friction into an already complex process. You can eliminate that friction. By adding context to the relationship, you can align parties on business goals, communicate risk in a language everyone will understand and more easily mitigate that risk.

Improving Third-Party Security Management: A Case Study with CAPTRUST

Length: 1 hour

In today’s dynamic cyber world, third-party security is necessary, but can be challenging to implement. Learn how a leading investment firm succeeded in creating a robust and efficient third-party security process.

Going From Inherent Risk to Residual Risk in a Fast Changing Landscape

Length: 1 hour

There is no shortage of data to consume, but who has the expertise and bandwidth to keep on top of this veritable flood of information? The answer for many organizations may be in truly understanding the inherent risk of every relationship, and tying residual risk ratings dynamically to events revealed by monitoring tools and other data we gather.

We use cookies to ensure you get the best experience on our website. Visit our Privacy Policy for more information.