TPSRM Fundamentals TPSRM Fundamentals
< Back to Webinars
November 17, 2021

TPSRM Fundamentals (Level 2): Best Practices for Third-Party Security Risk Management

November 17, 2021

If you are involved with InfoSec, IT risk or supply chain management, then you know that the key to minimizing your risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process. You might even know some of the basics of risk assessments, but you’re not sure how to take that knowledge to the next level. What are your next steps?

That’s where this webinar can help. Join Demi Ben-Ari and Dov Goldman in this series on TPSRM Fundamentals to learn the ins and outs of third-party security management. In this second webinar, you’ll learn essential best practices, including:

  • How to create security questionnaires that consider inherent risk
  • How to scope questionnaires according to activity and control mapping and the standards of control sets
  • How automation helps with third-party security risk management

Speakers

Demi Ben-Ari
Co-Founder and CTO
Dov Goldman
Director of Risk & Compliance, Panorays

Duration

51 min

If you are involved with InfoSec, IT risk or supply chain management, then you know that the key to minimizing your risk of third-party breaches is to implement a comprehensive and efficient third-party security risk management (TPRSM) process. You might even know some of the basics of risk assessments, but you’re not sure how to take that knowledge to the next level. What are your next steps?

That’s where this webinar can help. Join Demi Ben-Ari and Dov Goldman in this series on TPSRM Fundamentals to learn the ins and outs of third-party security management. In this second webinar, you’ll learn essential best practices, including:

  • How to create security questionnaires that consider inherent risk
  • How to scope questionnaires according to activity and control mapping and the standards of control sets
  • How automation helps with third-party security risk management

Building Trust Between Companies Worldwide

We use cookies to ensure you get the best experience on our website. Visit our Cookie Policy for more information.