Building a Better Third-Party Cyber Risk Program

June 9, 2021 | 1:00 PM EDT

Jump to registration form below

Share:

Partnering with:

 

Building a Better Third-Party Cyber Risk Program

According to Gartner, vendor risk management (VRM) is the process of ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance. In other words, whenever vendors, suppliers, or other third parties have access to your data, there is a risk that something bad might happen to it.

This risk is very real according to Deloitte, 20.6% of business leaders report having dealt with a situation where sensitive customer data has been breached through third parties. For a long time, questionnaires were one of the only ways to gather IT security information about third party vendors. Now, many companies rely on aggregating and analyzing externally observable cybersecurity risk factors that finally enable the continuous monitoring of vendor risk.

With continuous monitoring, risk and IT professionals can maintain a real-time understanding of the risks they're being exposed to by every vendor in their portfolio, and their vendor's vendors. Organizations can monitor and protect the data living outside their network in nearly the same way they monitor and protect internally stored data.

Join us for this executive roundtable discussion where we will explore how to implement an effective continuous monitoring program for third-party cyber risk.

In this session we will discuss:

  • The pros and cons of traditional approaches to assessing third-party cyber risk
  • How continuous monitoring can reduce the annual assessment burden
  • Getting started with continuous monitoring to optimize limited staff
  • How continuous monitoring can improve collaborating with vendors to eliminate cyber risk
  • Building a business case for funding of continuous monitoring

Key takeaways include:

  • Ideas to assist in the development of a continuous third-party monitoring capability
  • Tips and tricks about how to operationalize continuous monitoring of third-party cyber risk
  • Collaboration strategies for working with third-parties to reduce cyber risk and improve cybersecurity posture

Become a VIP attendee for the Building a Better Third-Party Cyber Risk Program Digital Boardroom and move your organization forward on current goals. If you are interested in attending the digital event, fill out the form below and a CDM Media representative will contact you with more information.

If you would like to speak directly with someone about the event, contact marketing@cdmmedia.com or +1 312.374.0805.

 
 

All Fields Are Required

A material condition of your attendance at this free event is that CDM may process your personal information (including but not limited to name, headshot, job title, etc.) and share such information with your fellow attendees, including sponsoring partners. That information will be used for event related materials such as the mobile app, website, and for event related marketing which may include data processing and outreach or other marketing by some of our fellow attendees and commercial partners. This is necessary for the legitimate interests of the business and the success of the event.



Submitting this registration signifies your agreement to the terms of the CDM Media privacy policy