Error loading player: No playable sources found

ENG2356

Navigating Your Third Party Technology and Cybersecurity Risk (TCH, PRAC, FIN)

Date
June 8, 2023
$49
Standard Price
This product is also available as part of the following products:
Thumbnail for AICPA & CIMA ENGAGE 2023
This includes sessions from AICPA & CIMA ENGAGE 2023:
Thumbnail for Corporate Finance (as part of AICPA & CIMA ENGAGE 2023)
This includes sessions from the conference: Corporate Finance (as part of AICPA & CIMA ENGAGE 2023)
Thumbnail for Practitioners Symposium (as part of AICPA & CIMA ENGAGE 2023)
This includes sessions from the conference: Practitioners Symposium (as part of AICPA & CIMA ENGAGE 2023)
Thumbnail for TECH+ Conference (as part of AICPA & CIMA ENGAGE 2023)
This includes sessions from the conference: TECH+ Conference (as part of AICPA & CIMA ENGAGE 2023)

Our worlds and our businesses are becoming more and more interconnected. Name a company, non-profit, government entity or agency that is able to keep all of their data on internally created applications; that can run without third-party technology. Of course, with each new application and third-party, our cybersecurity risk increases. There are various tools and techniques available to help us navigate our third-party risk. "Silver Bullets" don't work on these were-risks. Putting in the effort to acknowledge, comprehend, and document the third-party risk will allow you to communicate that risk appropriately to those charged with governance so they can decide to accept, mitigate, transfer or avoid the risk.

Learning Objectives

  • Understand how to properly evaluate a SOC 2 report (or a framework compliance certificate) from your vendor
  • Understand how to integrate 3rd party risk into the organization Risk Assessment using a Cyber Risk Assessment
  • Understand how 3rd party technology impacts your cybersecurity risk
  • Understand the how a data inventory (or lack thereof) can impact your cybersecurity risk
  • Understand the importance of culture on 3rd party technology risk management

General
FIN | TCH | PRA

Related Products

Thumbnail for Data Analytics 360: Practical Guide to Data Collection, Organization & Dashboards (PRA, TCH)
Data Analytics 360: Practical Guide to Data Collection, Organization & Dashboards (PRA, TCH)
Hearing a whole lot of buzz about Data/Analytics and not sure what it is all about? Debating whether to invest some time & energy to acquire much desired knowledge in this trendy Technology area? This session will not only teach but show you the why & how of data integration techniques as well as c…
Thumbnail for What are Power Skills and Why are they Important for Women (All Tracks)
What are Power Skills and Why are they Important for Women (All Tracks)
Once called “soft skills,” power skills are vital for success for an individual and business alike…
Thumbnail for Seeing Self-Identification Through Employee and Employer Lenses (All Tracks)
Seeing Self-Identification Through Employee and Employer Lenses (All Tracks)
The desire to recruit and retain a diverse workforce has led may organizations to ask employees to self-disclose demographic data. Through self-ID, organizations can have accurate data on employee demographics, which can in turn lead to increased resources and awareness…
Thumbnail for Want to Start a Cyber Practice? A Step By Step Guide to Help Insure Success (TCH, PRAC)
Want to Start a Cyber Practice? A Step By Step Guide to Help Insure Success (TCH, PRAC)
In today's rapidly evolving digital landscape, cybersecurity threats are becoming more sophisticated, targeted and frequent. As a result, businesses and organizations are seeking professional services to help them protect their sensitive data and networks…

This site uses cookies to store information on your computer. Some are essential to make our site work, others help us improve, the user experience. By using the site, you consent to the placement of these cookies. Visit our Privacy Center to learn more.