Managing Our Suppliers to Mitigate Against Third-Party Risk
Course
Islam Soliman explores essential monitoring tools for third-party access, incident notification mechanisms and the role of zero trust architecture in managing vendor relationships and protecting critical infrastructure.
As organizations increasingly rely on third-party vendors for critical infrastructure management, they face significant security challenges that can impact availability, safety and financial stability when these external partners are granted remote access privileges. The evolution from air-gapped networks to digital connectivity demands robust third-party risk management through comprehensive security frameworks including zero trust architecture, identity verification, session monitoring, least privilege enforcement, and real-time auditing.
In this session, Islam Soliman, senior solutions architect at Xona Systems, will cover:
- What essential monitoring tools should organizations implement when granting third parties access to infrastructure for management, maintenance and administrative purposes?
- In the event a third-party vendor is compromised, what mechanisms can ensure timely notification to your organization, and how can you verify compliance with incident disclosure requirements?
- Does zero trust play a significant role in third-party management?
Here is the course outline:
Conference and Master Template |