Document Type

Video

Streaming Media

Publication Date

10-20-2021

Keywords

Cybersecurity, data breach, third party risk management, supply chain risk management, data handling, cloud storage, systems security monitoring, Cyber Security Framework, #rd Party External Party Cyber Supply Chain Risk Management, Cyber Risk Management

Collection

MSOM Lunch and Learn Webinar Series

Abstract

Today’s business environment continues to be a challenge. Businesses whether small, or large leverage third-party vendors to provide critical services like data handling (security, transmitting, and storage), cloud storage/applications, and systems security monitoring.

Each business must ask themselves a few simple questions about one of their most valuable assets “Data”. If or when it leaves your secure working environment:

  • How secure is your customer data in transit and storage?
  • Do your third-party vendors handle your “critical information”?
    • Provide a secure environment for processing?
    • Comply with a proven Cyber Security Framework?
    • Perform a “Due Diligence” on-boarding step for the Nth vendors (how many vendors handles your specific data) in your cyber supply chain?
    • Follow security agreements and service level agreements catered to information security?
    • Ensure data privacy is an important element of their InfoSec Program?

It is more important than ever for businesses that handle proprietary information, personal identifiable information and protected health information to understand the threats and risk management practices to ensure “Critical Information” is secure. These questions and more will be covered in this webinar.

Comments

Moderated by Karin Hickenbotham

Mapping and managing cyber risks from third parties and beyond

https://www.pwc.com/us/en/services/consulting/cybersecurity-privacy-forensics/library/third-party-risks.html

State of Third-Party Risk Management 2020 Report

https://www.riskrecon.com/

Share

COinS