Third-Party Risk: You’ve Been Breached, How Can I Trust You?

This executive summary provides a transcribed overview of our recent webinar on managing third-party IT and cybersecurity risks up and down your supply chain.

  • What to do when you detect that your partner, vendor or supplier’s systems have been breached?
  • How do you cut off access and protect your organization’s systems and data with minimal business disruption?
  • When is it appropriate to restore access and how to conduct effective ongoing monitoring?
Third-Party Risk: You've Been Breached, How Can I Trust You | SAI360 whitepaper

Download

 


Watch the full webinar on-demand, or learn more about our solutions for third-party risk management.

Keep Reading