Главная
Study mode:
on
1
Intro
2
About Rose
3
Outline
4
The Overlooked
5
Office Fans
6
Vendor Evaluation
7
Third Party Risks
8
Case Study
9
Life Cycle
10
Governance
11
Planning
12
Due Diligence
13
Risk Assessment Lifecycle
14
Validate Responses
15
Risk Assessment Domains
16
Risk Level
17
Risk Assessment
18
Risk Acceptance
19
Scorecard
20
Contract negotiation
21
Ongoing monitoring
22
Termination
23
Case Study Review
24
Lessons Learned
25
Automation
26
Questions
Description:
Explore third-party risk management in cybersecurity through this 32-minute conference talk from BSides Columbus 2019. Delve into the often overlooked aspects of vendor evaluation, risk assessment, and lifecycle management. Learn about governance, planning, due diligence, and risk acceptance processes. Examine a real-world case study, discover lessons learned, and understand the importance of automation in managing third-party risks. Gain valuable insights into contract negotiation, ongoing monitoring, and termination procedures to enhance your organization's cybersecurity posture.

The Overlooked Cyber Security Risk - 3rd Party Risk Management

Add to list