Session ID: 11434

Abstract: Managing third-party vendor risk before, during and after onboarding is a continuous effort under global privacy laws and security regulations. While outsourcing operations to vendors can alleviate business challenges, managing the associated risk with manual tools like spreadsheets is complex and time consuming. To streamline this process, organizations must put procedures in place to secure sufficient vendor guarantees and effectively work together during an audit, incident, or much more. In this session, we'll breakdown a six-step approach to automating the third-party vendor risk lifecycle and explore helpful tips and real-world practical advice to improve your privacy and security risk programs.

Objective 1: Review the drivers and challenges organizations face when managing third-party vendor risk

Objective 2: Outline three methods for managing third-party security and privacy risk

Objective 3: Identify priorities before, during and after vendor procurement

Objective 4: Takeaway a six-step approach roadmap for automating the third-party vendor risk lifecycle

Objective 5: Hear real case studies from privacy experts on how to practically tackle the third-party vendor risk

Audience: -All-