June 9, 2021 | 1:00 PM EDT
According to Gartner, vendor risk management (VRM) is the process of ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance. In other words, whenever vendors, suppliers, or other third parties have access to your data, there is a risk that something bad might happen to it.
This risk is very real according to Deloitte, 20.6% of business leaders report having dealt with a situation where sensitive customer data has been breached through third parties. For a long time, questionnaires were one of the only ways to gather IT security information about third party vendors. Now, many companies rely on aggregating and analyzing externally observable cybersecurity risk factors that finally enable the continuous monitoring of vendor risk.
With continuous monitoring, risk and IT professionals can maintain a real-time understanding of the risks they're being exposed to by every vendor in their portfolio, and their vendor's vendors. Organizations can monitor and protect the data living outside their network in nearly the same way they monitor and protect internally stored data.
Join us for this executive roundtable discussion where we will explore how to implement an effective continuous monitoring program for third-party cyber risk.
In this session we will discuss:
Key takeaways include: