loader from loading.io

How to Manage Third Party Risk When you Have Thousands of Suppliers

Cyber Risk Fundamentals

Release Date: 11/28/2019

Neurodiversity and Cybersecurity – Untapping a superpower show art Neurodiversity and Cybersecurity – Untapping a superpower

Cyber Risk Fundamentals

Diversity within teams is essential, and neurodiversity within teams can be powerful – cyber threats are becoming more and more advanced and pervasive, and so the teams we build to defend and outthink cyber criminals need to have different mindsets.

info_outline
How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment show art How to Fast-Track Your Cybersecurity Journey with a No-Nonsense Gap Assessment

Cyber Risk Fundamentals

Organisations need to identify where their greatest cybersecurity risks lie, and how to close the gaps in a quick and cost-effective way. In this podcast, Nick Frost, Co-Founder and Director at CRMG and Martin Tully, Principal Consultant at CRMG share their experience working with organisations to conduct gap assessments and diagnostics of their cybersecurity programme, to make targeted changes fast.

info_outline
Data Ownership - a critical step in cybersecurity show art Data Ownership - a critical step in cybersecurity

Cyber Risk Fundamentals

In this podcast, Nick Frost, Co-Founder & Director at CRMG and Simon Lacey, Principal Consultant at CRMG, discuss why organisations that define data owners will be in a stronger position with their information security than those that don’t. Nick and Simon also share examples of how to identify and assign data owners, and how to get buy-in from the people who own data, and essentially the risk.

info_outline
Remote Working and the New Cybersecurity Threat Landscape show art Remote Working and the New Cybersecurity Threat Landscape

Cyber Risk Fundamentals

In this podcast with CyBourn, a managed detection and response provider, we share the alarming trends and attack patterns witnessed since the shift to remote working, and what we anticipate to see as we move into the new norm.

info_outline
Why Cybersecurity Policy is Still King show art Why Cybersecurity Policy is Still King

Cyber Risk Fundamentals

Developing an effective cybersecurity policy is a fundamental stepping stone when creating a comprehensive cybersecurity plan. In this podcast you will learn:

info_outline
Changing Senior Management's Perception of Cybersecurity for the Better show art Changing Senior Management's Perception of Cybersecurity for the Better

Cyber Risk Fundamentals

In the third episode of the ‘Cyber Risk Fundamentals’ series, Nick Frost is joined by Todd Wade and Andrew Wilson to explore what is now the biggest challenge for CISOs. Together they discuss:

info_outline
How to Manage Third Party Risk When you Have Thousands of Suppliers show art How to Manage Third Party Risk When you Have Thousands of Suppliers

Cyber Risk Fundamentals

In this podcast, CRMG’s Nick Frost, Todd Wade and Andrew Wilson discuss the key risks associated with third party suppliers, how to manage the process of on-boarding suppliers. and how to filter through suppliers to assess those most critical to your business. Our team also discuss the importance of managing the relationships with third party suppliers and the need for an exit strategy in the event of a split.

info_outline
A Pragmatic Approach to Defining your Threat Profile show art A Pragmatic Approach to Defining your Threat Profile

Cyber Risk Fundamentals

In this CRMG podcast, seasoned professionals in cyber risk and information risk share their insights and experiences threat profiling, the importance of defining your threat profile, and the threat actors that can influence your profile.

info_outline
 
More Episodes
Not so long ago, the idea of outsourcing critical business functions or IT systems to a third party supplier would have been off limits for many organisations because of the level of risk involved. However today, the use of third party suppliers has increased exponentially, with many organisations outsourcing even core functions of their business. Why? Outsourcing can be financially attractive, efficient and provide competitive advantage.
 
In delegating key processes to third parties, organisations are potentially exposing themselves to huge amounts of risk, and while you might be able to outsource functions, you can never outsource business risks or reputation. It is common for information security to be last in the process of due diligence when selecting suppliers. So, when you have thousands of suppliers, and they have thousands of suppliers, how far should you go to assess and mange cyber risk?
 
In this podcast, CRMG’s Nick Frost, Todd Wade and Andrew Wilson discuss the key risks associated with third party suppliers, how to manage the process of on-boarding suppliers. and how to filter through suppliers to assess those most critical to your business. Our team also discuss the importance of managing the relationships with third party suppliers and the need for an exit strategy in the event of a split.