Skip to content
Explore All

Mastering Third-Party Risk Management


Course
Enroll

Attackers often target the weakest link in the supply chain. A third-party risk program requires a holistic view of third parties and a way to automate the entire life cycle of supplier engagement. Sign up today to learn more from industry experts!

Since every vendor poses a security risk, organizations must classify them by risk and track the data they manage. Third-party risks can span from a law firm managing sensitive client information to a flower delivery company. A third-party risk program requires a holistic view of third parties and a way to automate the entire life cycle of supplier engagement. Organizations should classify risk using internal and external data to align it with the organization’s risk appetite.

In this session, Tim Theuri, executive head of cybersecurity, M-PESA Africa, and Bernard Munyaradzi Chadenga, chief digital protection officer, CGI Konsult, will share expert insights on:

  • The importance of classification, onboarding and continuous monitoring in third-party risk management;
  • The benefits of widespread automation in lieu of manual methods;
  • Why every security tool needs to adopt AI methodologies.

Here is the course outline:

Fortifying Your Supply Chain: Mastering Third-Party Risk Management