A solid mitigation strategy is vital when protecting your organisation from third-party risk. How can you regain control over your third-party risks, and what are the key components of an effective mitigation strategy? Watch the webinar with Intel 471 and Cybersprint!
The era of the digital supply chain has ushered in tens of thousands of 3rd party relationships that corporations must manage locally, regionally and across the globe. Intertwined between a corporation and 3rd parties are vast requirements to safeguard sensitive information. If negligent, regulatory and commercial penalties can be massive if either side is deemed culpable.
Regulators, such as the EBA, push you to stay in control over your suppliers. This effectively places a company within the familiar adage of “You’re as strong as your weakest link”. Meaning, in order to reveal weakness and to protect your organization, you must have continuous monitoring of threats which could impact their 3rd party digital supply chain.
In this webinar, Jason Passwaters (COO at Intel471) and Vincent Thiele (CISO at Cybersprint) discuss establishing and maintaining visibility into your external intelligence picture, why your digital footprint must be a key component of your 3rd party risk mitigation strategy and the added value of understanding the relation.
- Learn how CTI supports 3rd party risk mitigation strategy by establishing and maintaining visibility into the underground marketplace
- Understand the added value of 3rd party risk management
- How to ready your organization by mapping Tactics & Techniques to Mitre PRE-ATT&CK