Background Context: The Missing Element in Your Third-Party Security Program
< Back to Webinars
August 25, 2020

Context: The Missing Element in Your Third-Party Security Program

August 25, 2020

Your third-party security program involves 3 stakeholders: the business owner, you as the representative of the security and risk team and the vendor itself. Each party has its own needs, which introduces friction into an already complex process. You can eliminate that friction. By adding context to the relationship, you can align parties on business goals, communicate risk in a language everyone will understand and more easily mitigate that risk.

  • Easily engage with all stakeholders without extensive meetings and without collating lists of vendors and prepping docs on upcoming renewals.
  • Clearly explain the risk to your stakeholders without spewing a firehose of data at them or using overly technical language.
  • Communicate to the vendor the necessary steps to mitigate your risk.
  • Continuously monitor the vendor to ensure it maintains effective controls, staying within your risk tolerance for the relationship.

Speakers

Demi Ben-Ari
Co-Founder & CTO at Panorays, Google Developers Expert
Dov Goldman
Director of Risk and Compliance; Panorays

Duration

1 Hour

Your third-party security program involves 3 stakeholders: the business owner, you as the representative of the security and risk team and the vendor itself. Each party has its own needs, which introduces friction into an already complex process. You can eliminate that friction. By adding context to the relationship, you can align parties on business goals, communicate risk in a language everyone will understand and more easily mitigate that risk.

  • Easily engage with all stakeholders without extensive meetings and without collating lists of vendors and prepping docs on upcoming renewals.
  • Clearly explain the risk to your stakeholders without spewing a firehose of data at them or using overly technical language.
  • Communicate to the vendor the necessary steps to mitigate your risk.
  • Continuously monitor the vendor to ensure it maintains effective controls, staying within your risk tolerance for the relationship.

Building Trust Between Companies Worldwide

We use cookies to ensure you get the best experience on our website. Visit our Cookie Policy for more information.