What you will learn…
In today’s dynamic cyber world, third-party security is necessary, but can be challenging to implement. Learn how a leading investment firm succeeded in creating a robust and efficient third-party security process.
- The use case for improving third-party security management.
- Defining the process, roles and technologies to achieve cross-team collaboration.
- The journey to a mature program and overcoming speed bumps along the way.