exclusive online course
The 3Ps of Third Party Risk: Prevention, Policies, Promises
Independent research revealed that while 60% of firms have formal third party risk policies, nearly half have experienced a significant breach caused by a vendor. Why?
Sign up for our newsletter to be notified when this course goes live:
course description
Executives don’t make vendor risk a priority or are too trusting. Learn from 600 IT and security leaders about top concerns around supply chain and policies/procedures used to mitigate risks.
Attend this class to:
- Understand how to evaluate a vendors third party risk to your business
- Discuss the different types of adversarial campaigns and tools that are used to infiltrate third parties using real world examples
- Implement policies and procedures that mitigate third party risk.
Watch our bonus content for a taste of what the coursework will be like.
Your CyberEd Instructor
Mark Sangster
Vice President and Industry Security Strategist, eSentire
As a member of the LegalSec Council with the International Legal Technology Association (ILTA), Sangster is a cybersecurity evangelist who has spent significant time researching and speaking to peripheral factors influencing the way that legal firms integrate cybersecurity into their day-to-day operations. His experience unites a strong technical aptitude and an intuitive understanding of regulatory agencies.