

May 12, 2020
How to Build a Program to Manage Your Third Parties and Supply Chain
May 12, 2020
Learn how to scale an actionable third-party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture.
- Perform third-party evaluations based on the inherent risk or criticality of each relationship
- Achieve transparency into third parties’ security practices
- Implement compensating internal controls when the third parties don’t have or will not reveal their own
- Collaborate with third parties to ensure success in the remediation process
Learn how to scale an actionable third-party program, and how that program can provide transparency into your partner’s security while facilitating significant improvements in your company’s cybersecurity posture.
- Perform third-party evaluations based on the inherent risk or criticality of each relationship
- Achieve transparency into third parties’ security practices
- Implement compensating internal controls when the third parties don’t have or will not reveal their own
- Collaborate with third parties to ensure success in the remediation process