webinar register page

Webinar banner
What Am I Trying to Protect? Prioritizing Third-Party Risk Management
Supply chain attacks and ransomware affecting critical infrastructure have proliferated in news reports lately. While there is no silver bullet to stop all risks, many protections against them are those we already have in place, centered around cybersecurity hygiene and fundamentals. However, the supply chain is truly a chain, meaning you have to ensure not only your enterprise’s security but also your supplier’s and everyone else’s downstream in the chain. Many organizations have a “Trust but Verify” security model that dwindles to just “Trust” the farther down the chain they go. While we can audit third-party suppliers, it becomes unfeasible to do so with fourth and fifth parties. However, we are seeing more attackers pivot to extort not only the primary victim of a third-party data breach but also the victim’s customers and partners. Join our conversation as we discuss how to conduct third-party risk management without going down an endless rabbit hole as well as how to investigate attacks effectively, so that the cybersecurity community can learn from your findings.

Attendees of the ISE® Fireside Webinars will earn 1 CPE credit upon its conclusion. T.E.N. will provide instructions for credit submission following the webinar.

Sep 22, 2021 02:00 PM in Eastern Time (US and Canada)

Webinar is over, you cannot register now. If you have any questions, please contact Webinar host: Marci McCarthy.