TPCRM Fundamentals (Level 2): Best Practices for Third-Party Cybersecurity Risk Management
If you are involved with InfoSec, IT risk or supply chain management, then you know that the key to minimizing your risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPCRM) process. You might even know some of the basics of risk assessments, but you’re not sure how to take that knowledge to the next level. What are your next steps?
That’s where this webinar can help. Join Demi Ben-Ari and Dov Goldman in this series on TPCRM Fundamentals to learn the ins and outs of third-party security management. In this second webinar, you’ll learn essential best practices, including:
- How to create security questionnaires that consider inherent risk
- How to scope questionnaires according to activity and control mapping and the standards of control sets
- How automation helps with third-party security risk management