Event Date: August 29, 2018
Hosted By: RSA & Carahsoft
Government organizations are outsourcing and using third-party contractors with greater frequency to deliver products and services, manage sensitive data, and support the management of data centers, critical infrastructures, and cloud environments. With so many relationships, governance of third-parties and their corresponding risks can be difficult to understand, track, and manage.
Download this archived webcast with Jon Boyens, Lead Program Manager for NIST and Marshall Toburen, GRC Specialist for RSA, to push through the starting gate that is governing risk and learn how to prioritize what is most important to your organization and its expanding risk footprint.
During this webcast, NIST and RSA discussed:
Best practices organizations need to consider regarding third-party management lifecycle
The NIST CSF and how it relates to third-party risk management
Establishing and capturing performance metrics related to product and services engagements to clearly understand overall supplier risk profile
Understanding risks of deteriorating vendor performance in order to quickly mitigate and resolve third-party governance problems
The importance of consistently and methodically collecting all third-party information, profiles, business hierarchy, accountable contacts, contracts, facilities, and their subcontractor dependencies
Exercising consistent and detailed third-party risk assessments to determine their control environment, identify relevant risks, and collect relevant supporting documentation
Fill out the form below to view this archived event.
RSA Identity Lifecycle simplifies and automates how user access is delivered. By combining a business-friendly interface for access request and approval with an innovative approach to automating user access changes across all target systems, organizations can deliver business agility while lowering ...
RSA Identity Governance simplifies how user access is governed across the enterprise, making it possible to achieve sustainable compliance by fully automating the monitoring, reporting, certification, and remediation of user entitlements.
In many cases, federal agencies could use multiple approaches to secure applications. Each resource is working to protect access to its assigned area, but most often lacks centralized visibility, a convenient user experience, and a consistent approach to authentication policies and procedures. To ad...
Business disruptions can catch us off guard. In a time of
crisis, many organizations may not be entirely sure how to
respond. After all, global and prolonged disruptions don’t
come along every day. And when they do, they rarely have
the profound personal and global implications we’ve seen