ISO 27001:2022 Certification and Transition: How We Did It
Watch this webinar on ISO 27001:2022 transition and get guidance on certification, maintaining, or transitioning to the updated...
A data breach or business disruption via a third-party is a real and present danger for everyone, as incidents like SolarWinds and Kaseya have highlighted. So how do we cope with managing our security risk across 100s or 1000s of third-parties? Supply chain risk management done well.
However, that’s easier said than done. Simply extending practices that have had limited success internally – check-box compliance with control frameworks and security scorecards – can result in a massive bureaucratic overhead without addressing real business risk.
According to McKinsey, a risk-based approach is the next stage in many organizations’ cybersecurity journey, strengthening their resiliency at a lower overall cost. This requires a laser-like focus on the data, metrics and analytics required to maintain a clear visibility of risk and prioritize actions. And effective supply chain risk management cannot do without it.
Watch this webinar to learn:
– How to focus your engagement with third-parties on the areas that really matter
– Strategies that will deliver better security for lower cost
– How technologies can help you reduce risk and keep on top of the ever-changing supply chain risk landscape.