Earn 1.5 CPE credits on this webinar
From malware-laced updates to vulnerable open-source dependencies, attackers are increasingly targeting the vendor software that enterprises rely on to operate their business. According to a recent Gartner survey on Third Party Risk Management, 83% of Cyber risk professionals find risks embedded within vendor applications after deployment. As a result, it is clear that the status quo for defending the enterprise from cyber threats originating in the software supply chain is no longer sufficient. Organizations must adopt new strategies to more effectively manage third party security risk, ensuring vendor software can be safely onboarded, while still maintaining business velocity.
During this session, our panelists will explore:
- What makes third party software inherently risky
- Actions you can take to identify risks before software is purchased or deployed
- How to work collaboratively with a vendor to address risks
- Protections that can be put in place to mitigate vendor software risks
- Best practices for continuously monitoring risk throughout the vendor lifecycle