Aligning Cybersecurity Best Practices with Third-Party Risk


This event qualifies for 1.5 CPEs


The cyber threat landscape grows exponentially each year. Third-party cyber data breaches like the Kaseya data breach, a cyberattack that affected over 1,500 organizations, have prompted regulators to raise cybersecurity standards. In the United States, the Biden Administration aims to improve nationwide cybersecurity with an executive order. The 100-day plan aims to modernize federal infrastructure, improve supply chain security, establish a cybersecurity review board and more.


Gaining visibility into the security risks your supply chain or third-party vendors pose to your organization is a necessity among cybersecurity leaders. Next-generation cybersecurity practices will require organizations to align both internal and external cybersecurity risk processes to create a standardized process to facilitate effective third-party cyber risk mitigation. On this webinar as we explore the intersection of third-party risk management and cybersecurity best practices.


We’ll review new strategies and outline the steps to mature your program, and you will learn how to:

  • Map external third-party risk to internal cybersecurity controls
  • Evaluate control effectiveness internally and externally to track issues over time and stay ahead of future incidents
  • Prioritize third-party risk projects based on control gaps and domain inefficiencies
  • Build a cybersecurity program that protects against internal and external threats.

Speaker and Presenter Information

Colin Whittaker with Maor Bin, Adaptive Shield and speakers from Prevalent, RiskRecon, and OneTrust

Relevant Government Agencies

Other Federal Agencies, Federal Government, State & Local Government


Event Type
Webcast


This event has no exhibitor/sponsor opportunities


When
Thu, Feb 16, 2023, 1:00pm - 2:00pm ET


Cost
Complimentary:    $ 0.00


Website
Click here to visit event website


Organizer
Executive IT Forums



Return to search results