Information Security Playbook Walkthrough
- May 5, 2017
How can you best manage information security risk? What’s a controls framework? How can you apply and adapt standards to automate and manage InfoSec threats posed by your vendors, suppliers and partners? In this webinar, Opus experts Mark DeLuca and Dov Goldman walk through essential tools for managing third party information security risk, along with the structure and assignment of key tasks to those in your organization. Based on an OCEG playbook, Dov and Mark also review the Opus recommended approach.
Listen now to learn :
- What is information security third party risk?
- What are the key steps to take in assessing each party’s risk level?
- What specific “plays” can help you assess risk and assign controls? See them in action
Data Risk in the Third-Party Ecosystem: 2nd Annual Study by Ponemon Institute
Now in its second year, the study illustrates the array of challenges companies face managing third party risk.
Process at a Glance: How to Manage Third Party Information Security Risk
Get an overview of the third party information security management process with this infographic from Opus & OCEG.
Want to free your business?
Contact us to discuss your third party information security needs.Contact Us