Please note: CPE is not available for webinars on-demand. CPE is available only for live events.

Presented by: Carly Devlin and Stephen Chasser

As organizations are increasingly relying on third-parties for various business processes and services, it’s important, from an information security and regulatory perspective, to understand how the organization’s data is being handled by those third-parties. Organizations must take a risk based approach to assessing the technology control environment of third-parties to ensure adequate protection of data. In this webinar, we will explore various third-party risk assessment approaches, roadblocks organizations are facing regarding third-party technology risk management, and solutions for overcoming those roadblocks in the most efficient way possible.

Learning Objectives:

  • Understand various third-party risk assessment approaches
  • Awareness of roadblocks organizations are facing regarding third-party technology risk management
  • Helpful solutions for overcoming roadblocks in the most efficient way possible

Who should attend: Information Risk Management professionals, IT auditors, CISOs, CIOs

Speaker

Managing Director

Webinar Details

Date & Time

September 11, 2018 1:00 PM - 2:00 PM

STAY UP-TO-DATE ON INFORMATIONAL WEBINARS

Subscribe To Get CSH Events
Delivered To Your Inbox