How to Optimize Third-Party Risk Management Programs Through NIST CSF 2.0

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Extensive digital transformation programs in organizations over the past few years has sparked an explosion in their use of third-party services. While this trend has helped enhanced operational capabilities, it has also expanded organizations’ cyber-attack surfaces, with an explosion in access points and potential vulnerabilities.

The latest edition of the popular National Institute of Standards and Technology's Cybersecurity Framework (NIST CSF), version 2.0, has recognized these changes and provides new guidance to help organizations effectively manage the subsequent risk.

In this webinar, an expert panel will explore the updates to the CSF in relation to third-party risk, and offer practical advice on how to integrate the framework into their supply chain risk management programs.

Join this session to learn about:

  • The evolving third-party risk management landscape, and how attackers are taking advantage of more complex attack surfaces
  • How the NIST CST 2.0 approaches this area of cybersecurity and why these changes have been made
  • How to effectively integrate the provisions into your third-party risk management program, taking into account your specific organization and sector

Speakers

Photo of James Coker

James Coker

Deputy Editor, Infosecurity Magazine

Photo of Russ Horn

Russ Horn

President, CoNetrix

Photo of Ed Moyle

Ed Moyle

Partner, SecurityCurve

Photo of Dave  Stapleton

Dave Stapleton

CISO & VP Security Operations, ProcessUnity

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for ProcessUnity here: https://www.processunity.com/privacy-policy/. Please see Infosecurity Magazine’s privacy policy for more information.