Menu
×
×

Sign Up

Your Profile will be reviewed by Admin
EVENT DATE
Jun 2017
MoTuWeThFrSaSu
   1234
567891011
12131415161718
19202122232425
2627282930  

Venue

Google Map

Managing Vendor Risk: The Cybersecurity Perspective

Overview

When companies outsource technology and security solutions, the question on everyone’s mind is: When does our liability for a cyber-attack end, and my vendor’s begin?

The answer is not really simple. In most industries, you can contract away a responsibility or task, but not the liability of an attack or the compliance obligations. If your organization was breached today, whose name is going to be in the news? Who are your customers going to call? Who is going to get fined and possibly sued as a result of the breach? The list of questions goes on. At the end of the day, your organization will suffer the negative publicity, the reputation damage, and financial loss of the attack, even if your vendor actually caused your incident. Then there is the other side of the equation – how do you know that your vendor can truly support your organization, perform the tasks you’ve contracted them for, or cover your losses if the breach is their fault?

Vendor risk management and due diligence is something every organization should perform carefully, and there are a number of unique issues when considering the inherent risks associated with technology and security providers.

The benefits of outsourcing are attractive for many reasons, but you need to ask yourself: Can you stake your organization’s well-being and financial stability on a vendor? If you answered no, then join us to discover:

  • Weighing vendor risk and classifying critical / high risk vendors
  • Imperative questions you need to ask your vendors
  • Documentation to gather when outsourcing your technology and/or security solutions
  • The big differences in cyber insurance
  • The unique ongoing due diligence needs of outsourced technology and/or security solutions
  • Critical contract provisions

Seminar Fee Includes:LunchAM-PM Tea/CoffeeSeminar MaterialUSB with seminar presentationHard copy of presentationAttendance Certificate$100 Gift Cert for next seminarDOWNLOAD BROCHURE

This course offers a unique opportunity for attendees to develop critical risk management skills to apply immediately upon returning to the office. This is a fast-paced, highly interactive workshop where attendees will develop a risk profile and risk management strategy using one of their own current or future vendors of choice.

Learning Objectives:

  • Record unique risks of vendors who support an organizations' technology and/or security solutions
  • List the organization's unique critical vendors
  • Develop a risk profile for a chosen critical vendor
  • Inventory appropriate risk management strategies
  • Assemble a plan for managing vendor risk

Who will Benefit:

Any individual responsible for managing risk related to outsourced technology and/or security vendors. Includes, but not limited to:

  • Information security,
  • Information technology,
  • CPAs,
  • Operations,
  • Accounts Payable,
  • Risk management,
  • Risk managers,
  • Business continuity,
  • Top management.

Note:
Use coupon code NB5SQH8N and get 10% off on registration.

For Registration:

http://www.complianceonline.com/cyber-security-vendor-management-due-diligence-risk-management-seminar-training-80467SEM-prdsm?channel=eventsinamerica

Notes:
Sponsorship Details:

RELATED EVENTS +

MORE events +

Display Makers +

Promo Makers +

Other Services Providers