How do you continuously monitor the security performance of third parties in your ecosystem? As risk managers, could you wholeheartedly trust yearly assessments and information from vendors without independent verification?
Asking critical questions such as these are essential to ensure organisations have strong cyber-security measures and remediation plans in place to overcome external risk.
In our next episode of teissTalk with Thom Langford, we’ll explore:
- A proactive approach to third-party risk - continuous monitoring of suppliers
- Using threat intelligence to identify third-party risk
- Effectively working with partners to mitigate third-party security risks
Join us for a deep dive into robust strategies for nullifying threats from external parties such as vendors, suppliers and contractors.