f582c101-a9e7-46a0-ba3e-aead632069b9

Mitigating third-party risk with threat intelligence

How do you continuously monitor  the security performance of third parties in your ecosystem? As risk managers, could you wholeheartedly trust yearly assessments and information from vendors without independent verification?

Asking critical questions such as these are essential to ensure organisations have strong cyber-security measures and remediation plans in place to overcome external risk.

In our next episode of teissTalk with Thom Langford, we’ll explore:

  • A proactive approach to third-party risk - continuous monitoring of suppliers
  • Using threat intelligence to identify third-party risk
  • Effectively working with partners to mitigate third-party security risks

Join us for a deep dive into robust strategies for nullifying threats from external parties such as vendors, suppliers and contractors.


I understand and agree that Lyonsdown Limited may collect and process my personal data ahead of teissTalk for the purpose of operating such webinar in accordance with our privacy policy

I hereby provide my explicit consent for Lyonsdown Limited to use my personal data for their marketing purposes in accordance with our privacy policy

I hereby provide my explicit consent for Lyonsdown Limited to share my personal data with Silobreaker for their marketing purposes as governed by their Terms and Conditions and Privacy Policy.