Third Party Cyber Risk Management (TPCRM) Best Practices That Reduce Supply Chain Risk

Featuring

  • CyberGRX
  • Telstra Ventures

About This Webinar

The challenge is organizations are adopting digital transformation, and as a result increasing their reliance on third parties, faster than they can scale their third-party cyber risk management programs. This transition is creating a gap that is being actively exploited by attackers which is evident by the fact that over 50% of all breaches are linked to a third party.

The good news is we’ve gotten a lot smarter about third-party risk management and there are a lot of best practices and tools that can help you optimize your program today.

About Telstra Ventures

We drive strategic growth, shorten the time to reach global scale, facilitate introductions, but we don’t stop there. We stick with it until the ink is dried. We drive revenue, recruit, and introduce future investors. But of course we would say that. Hear what our portfolio companies have to say.

  1. David Davis

    Host David Davis Author, Speaker, and vExpert ActualTech Media

  2. Shane Hasert

    Featuring Shane Hasert Director of Assessment Operations CyberGRX

  3. To Be Announced

    Featuring To Be Announced Telstra Ventures

What You'll Learn

  1. The foundational components of effective TPCRM Program
  2. How to use data to manage third-party risk
  3. Common Third Party Cyber Risk Management (TPCRM) misconceptions that can lead you astray