InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

CPE | Modern TPRM: Strategies for Securely Onboarding Vendor Software

Presented by

Colin Whittaker with Charlie Jones, ReversingLabs; Nick Geyer, Onetrust; and Dave Stapleton, ProcessUnity.

About this talk

Earn 1.5 CPE credits on this webinar From malware-laced updates to vulnerable open-source dependencies, attackers are increasingly targeting the vendor software that enterprises rely on to operate their business. According to a recent Gartner survey on Third Party Risk Management, 83% of Cyber risk professionals find risks embedded within vendor applications after deployment. As a result, it is clear that the status quo for defending the enterprise from cyber threats originating in the software supply chain is no longer sufficient. Organizations must adopt new strategies to more effectively manage third party security risk, ensuring vendor software can be safely onboarded, while still maintaining business velocity. During this session, our panelists will explore: - What makes third party software inherently risky - Actions you can take to identify risks before software is purchased or deployed - How to work collaboratively with a vendor to address risks - Protections that can be put in place to mitigate vendor software risks - Best practices for continuously monitoring risk throughout the vendor lifecycle
Executive IT Forums

Executive IT Forums

55838 subscribers96 talks
Empowering the GRC Community
The IT GRC Forum produces online events and provides professional networking facilities and market intelligence to Governance, Risk Management and Compliance professionals.
Related topics