Supply Chain Security: Easing the Headache of Third-Party Risk Assessments

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Third-party security and risk assessments have always been important, but rapid digitization and outsourcing during the COVID-19 pandemic has brought the topic to even greater prominence. High-profile attacks are occurring as a result of third-party vulnerabilities and it’s becoming an increasingly talked about topic at board level, particularly in light of the SolarWinds attacks.

A thorough understanding of the risks within a supply chain will be essential going forward, with external customers and senior leadership within an organization wanting to be satisfied that third party partners are meeting security and regulatory compliance rules.

The traditional approach of sending questionnaires to companies is costly, time-consuming and often ineffective, particularly in the current landscape. In this webinar, a panel of experts will discuss how security and regulatory teams can conduct efficient and accurate assessments of the security vulnerabilities in third parties, as well as ensure data protection rules are being met.

In this session, attendees will learn:

  • How the COVID-19 crisis has made it easier for malicious actors to target supply chains, and the potential damage that can be caused by successful attacks
  • The inadequacies of current approaches to vendor risk management and the growing availability of cutting-edge solutions 
  • How to benefit from a centralized risk assessment exchange that combines both enterprise and third-party vendors on the same platform
  • How to guard against failures in third party risk management


Photo of Manoj Bhatt

Manoj Bhatt

Head of Cyber Security and Advisory, Telstra Purple

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Max Dalziel

Max Dalziel

Strategic Account Director, CyberGRX

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.