The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Who has access to your company’s data and what risks do they pose to your organization? While these questions seem basic, most organizations cannot confidently answer them, despite an accelerating trend of third-party threats and incidents. Building a robust third-party risk program is complex and takes time. Building a program that allows information security teams to be strategic in managing third-party risks is even more challenging. During this session, we will guide you through how to successfully implement a strategic and technology-enabled third-party risk program to manage this emerging source of risk.
You must be logged in and own this session in order to
post comments.