Who has access to your company’s data and what risks do they pose to your organization? While these questions seem basic, most organizations cannot confidently answer them, despite an accelerating trend of third-party threats and incidents. Building a robust third-party risk program is complex and takes time. Building a program that allows information security teams to be strategic in managing third-party risks is even more challenging. During this session, we will guide you through how to successfully implement a strategic and technology-enabled third-party risk program to manage this emerging source of risk.
You must be logged in and own this session in order to