A solid mitigation strategy is vital when protecting your organisation from third-party risk. How can you regain control over your third-party risks, and what are the key components of an effective mitigation strategy? Intel 471 and Cybersprint invite you to join the webinar "mitigating 3rd party risk" on 27 May 2020, 3pm CEST
The era of the digital supply chain has ushered in tens of thousands of 3rd party relationships that corporations must manage locally, regionally and across the globe. Intertwined between a corporation and 3rd parties are vast requirements to safeguard sensitive information. If negligent, regulatory and commercial penalties can be massive if either side is deemed culpable.
Regulators, such as the EBA, push you to stay in control over your suppliers. This effectively places a company within the familiar adage of “You’re as strong as your weakest link”. Meaning, in order to reveal weakness and to protect your organization, you must have continuous monitoring of threats which could impact their 3rd party digital supply chain.
In this webinar, Jason Passwaters (COO at Intel471) and Vincent Thiele (CISO at Cybersprint) will discuss establishing and maintaining visibility into your external intelligence picture, why your digital footprint must be a key component of your 3rd party risk mitigation strategy and the added value of understanding the relation.
- Learn how CTI supports 3rd party risk mitigation strategy by establishing and maintaining visibility into the underground marketplace
- Understand the added value of 3rd party risk management
3.10-3.30 Crashing the party: Leveraging CTI to mitigate 3rd party risk. Jason Passwaters, COO at Intel 471
3.30-3.50 Ready your organization for 3rd Party Risk management - mapping tactics & techniques to Mitre PRE-ATT&CK. Vincent Thiele, CISO at Cybersprint