19:00 - 19:45
DigitalHeist Open House: Protecting Your Perimeter: Strategies for Effective 3rd Party & Vendor Risk Management
In today’s interconnected world, third-party vendors and partners are integral to your business, but they also introduce significant cybersecurity risks. Let’s delves into the essential elements for building a robust Third-Party Risk Management program that safeguards your organization.
- Risk Assessment: How to assess the 3rd parties? What due diligence is needed?
- Continuous Monitoring: Criteria consideration for the same frequency?
- Regulatory Compliance: Dealing with Internal and external regulations?
- Incident Response: Key areas of consideration for robust plan?