Third Party and Cyber Risk Management
Sessions in this track will focus on the ongoing process of discovering, correcting, and preventing security problems, and implementing plans to address future risks.
Topics include:
- Business impact analysis (vulnerability scan, dependencies)
- 3rd party risk + supply chain
- Penetration testing (social engineering, infrastructure, whitebox, blackbox)
- Data control risk assessment (data flow map)
- Cyber insurance
- Crisis management
- Risk appetite