Please note: CPE is not available for webinars on-demand. CPE is available only for live events.
Presented by: Carly Devlin and Stephen Chasser
As organizations are increasingly relying on third-parties for various business processes and services, it’s important, from an information security and regulatory perspective, to understand how the organization’s data is being handled by those third-parties. Organizations must take a risk based approach to assessing the technology control environment of third-parties to ensure adequate protection of data. In this webinar, we will explore various third-party risk assessment approaches, roadblocks organizations are facing regarding third-party technology risk management, and solutions for overcoming those roadblocks in the most efficient way possible.
- Understand various third-party risk assessment approaches
- Awareness of roadblocks organizations are facing regarding third-party technology risk management
- Helpful solutions for overcoming roadblocks in the most efficient way possible
CPE: 1 Credit Hour
Who should attend:
Information Risk Management professionals, IT auditors, CISOs, CIOs