Analyst Insight: The Gartner® Market Guide for IT Vendor Risk Management Solutions

Img hero short

5 Third-Party Risk Management Must-Haves & Must-Dos

5 Third-Party Risk Management Must-Haves & Must-Dos

As an IT security practitioner, you’re familiar with the old maxim: You’re only as strong as your weakest link. Unfortunately, for many organizations, your weakest link – and your lowest priority – could be a third party with access to your systems and data. What happens if a third party fails? What happens to you if your vendor is the next SolarWinds?

Join Dr. Eric Cole, founder and an executive leader at Secure Anchor Consulting, and former CTO of McAfee and Chief Scientist for Lockheed Martin, as he defines the must-have capabilities and must-do tasks for establishing a robust third-party risk management program.
In this webinar, Dr. Cole discusses:

  • How to craft a comprehensive vendor inventory
  • How to assign vendors an exposure score by cataloging what data the service has access to
  • What steps your company can put into place to mitigate the risk in the case of vendor failure
  • What information you need from vendors on the security measures they have in place
  • How to include vendors in recovery plans

This webinar delivers practical, hands-on guidance to improve third-party risk management and close vendor security gaps.

  • Ready for a demo?
  • Schedule a free personalized solution demonstration to see if Prevalent is a fit for you.
  • Request a Demo