Evolving a Third-Party Risk Management Program
Course
Join Anbu David, Mathan Babu Kasilingam, and Deval Mazmudar in an exploration of third party risk management.
With third-party-sourced breaches regularly making the headlines, most companies have become aware of the risks created by this extended attack surface - often because they have been victims themselves. By following the right path, security and risk leaders can feel confident in their approach to managing the cyber risk posed by third parties.
Here is the course outline:
Third-Party Risk Management: How to Evolve a Program |