oaxino Posted May 17 Report Share Posted May 17 Published 5/2025MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 ChLanguage: English | Duration: 2h 17m | Size: 1.71 GBA comprehensive guide to cyber security third party riskWhat you'll learnGain a comprehensive understanding of Cyber Security Third Party RiskUnderstand the regulatory and business drivers for managing cyber security third party riskUnderstand inherent risk and how to use it to prioritise or tier third parties for reviewGain insights into conducting effective due diligence of a third party's cyber security practicesLearn tips on how to effectively deal with third party risks identified following the reviewRequirementsNo prior knowledge of cyber security third party risk is required, however an understanding of cyber security or cyber risk would be helpful.DescriptionUnderstand why Cyber Security Third Party Risk Management is so important for organisations and what steps your organisation needs to take.You will get a firm grasp of the cyber security third party risk today's organisations face and what steps organisations and industries like yours can take to help manage this risk and protect themselves.· Gain a solid understanding of the background and context to Cyber Security Third Party Risk, by looking at the Cyber Security and Third Party Risk backgrounds, and how they "meld" together.· Learn about the importance of cyber security third party risk for organisations, and see how some of the latest high profile security breaches on organisations have been a result of their third party relationships· Learn how to assess cyber security third party risk associated with your suppliers and the services their provide. Understand the concepts of Inherent Risk how to assess this using "CIA Triad" of confidentiality , integrity and availability and how we can use these to prioritise due diligence activities.· Learn what key standards and regulations require organisations to do regarding cyber security third party risk, including ISO 27000, PCI DSS, Cyber Essentials, the GDPR, DORA and NIS 2.· Learn about the different approaches to undertake due diligence of your third party's cyber security posture, including design tips for custom questionnaires, and how to gain the most from SOC 2 reports and third party ISO 27001 certifications. · Learn about the importance of legal contracts in addressing cyber security third party risk, and the importance of contract negotiation· Understand and see samples of the documentation your cyber security third party risk management programme will require including samples of policy, procedures and templates.· Learn about the importance of communications with suppliers and key stakeholders during the cyber risk third party risk management lifecycle, and how to manage the remediation of gaps within your third party's security controls measures.Who this course is forProfessionals in Information or Cyber SecurityProcurement or sourcing teams, business stakeholders and others who own or manage the services and relationships with third partiesStudents or graduates in a Cyber Security discipline, or IT professionals who wish to increase their knowledge of this highly relevant cyber security topicHomepage:https://www.udemy.com/course/cyber-security-third-party-risk/ScreenshotsDownload linkrapidgator.net:https://rapidgator.net/file/d3e477c694dfca91e29261f5da4caaa3/exifr.Cyber.Security.Third.Party.Risk.part1.rar.htmlhttps://rapidgator.net/file/7f7cd6ac3405e88935422cfd4bef0d24/exifr.Cyber.Security.Third.Party.Risk.part2.rar.htmlnitroflare.com:https://nitroflare.com/view/5CA895C18857EA6/exifr.Cyber.Security.Third.Party.Risk.part1.rarhttps://nitroflare.com/view/586B9895BAD87DD/exifr.Cyber.Security.Third.Party.Risk.part2.rar Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now