About This Webinar
The challenge is organizations are adopting digital transformation, and as a result increasing their reliance on third parties, faster than they can scale their third-party cyber risk management programs. This transition is creating a gap that is being actively exploited by attackers which is evident by the fact that over 50% of all breaches are linked to a third party.
The good news is we’ve gotten a lot smarter about third-party risk management and there are a lot of best practices and tools that can help you optimize your program today.
About Telstra Ventures
We drive strategic growth, shorten the time to reach global scale, facilitate introductions, but we don’t stop there. We stick with it until the ink is dried. We drive revenue, recruit, and introduce future investors. But of course we would say that. Hear what our portfolio companies have to say.
Host David Davis Partner & vExpert, ActualTech Media
Featuring Shane Hasert Director of Assessment Operations, CyberGRX
What You'll Learn
- The foundational components of effective TPCRM Program
- How to use data to manage third-party risk
- Common Third Party Cyber Risk Management (TPCRM) misconceptions that can lead you astray