Is Your Business Audit-Ready? Third Party Risk Management Best Practices for Regulation

Cyber Security Digital Summit Fall 2019

In this Cyber Security Digital Summit presentation, learn how to streamline a third-party risk management program for compliance with major regulations, the top components of third-party risk management regulation, and what activities should be completed to prepare for compliance.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.

This FREE webinar was recorded on:
November 12, 2019
10:30 AM - 11:15 AM EST

Amidst several stringent privacy regulations, businesses are under pressure to look closely at how they assess, monitor, and mitigate risk with third-parties. To maintain compliance with all applicable regulations, companies are seeking more automation and centralized databases for third-party risk management throughout the entire vendor lifecycle. In this session, discover the key operational features to implement in your own organization to ensure you’re audit ready for any regulation.

  • How to streamline third-party risk management program for compliance with major regulations
  • The top components of third-party risk management regulation
  • What activities should be completed to prepare for compliance

Zach Reed, Solutions Engineer, OneTrust

Host:

Jeff Orr
Editor In Chief
Cyber Security Hub

Jeff Orr is a veteran technology strategist, conference producer, and industry analyst passionate about the way people interact with systems and machines through emerging technologies and new user experiences. At Cyber Security Hub, he oversees all editorial direction of its complete portfolio of online products -- as well as engages a network of esteemed industry board members, analysts and key influencers to make CSHub a renowned resource for all things cyber security. Jeff was actively involved in the development and launch of industry-first products, including Wi-Fi and 4G solutions, and leading the wireless strategy for a Fortune 100 entertainment company. His research on emerging technologies includes AI, cyber security, Industrial IoT (IIoT), mobile computing, wearables, and user interfaces.

We respect your privacy, by clicking ‘Watch On Demand’ you agree to receive our e-newsletter, including information on Podcasts, Webinars, event discounts and online learning opportunities. For further information on how we process and monitor your personal data click here. You can unsubscribe at anytime.
Sponsored By: