A discussion on how to deal with the challenges of managing third-party vendor cyber risk.
No business leaves the back door open at night. Yet companies often use third-party service providers without checking their security and privacy measures. And when these providers have their own third-party service providers, risk multiplies.
So, even if you have robust security measures across your network and systems, your assets – trade secrets, IP, personal data, business data, reputation, even – can be low-hanging fruit for a cyber-attack. Join us for a conversation on the challenges and strategies of managing supply chain and third-party vendor risks, including:
Register now to reserve your spot!
2002, 2016, 2019 Chapter of the Year
© Minnesota Chapter of ISSA International