NON-MEMBERS - PhP400
Organizations these days are no islands. They need other organizations to survive. Some procure contractors, outsource their payroll or use cloud services – resources, processes and equipment that would usually cost more if produced in-house. As organizations acquire third parties, their cybersecurity ecosystem expands.
This lecture aims to give participants an overview of the third party security assessment process, with focus on the following:
• The risk tiering process
• The assessment process
• The risk rating process