When Working with Third Parties – It’s a Rocky Road

Companies are increasingly engaging with and relying on different flavors of third parties.  New privacy regulations, shifting cybersecurity threats, and frequent data breaches have created a challenging third-party risk landscape, especially for financial organizations, where the information held and shared is among the most sensitive and highly regulated. This session will explore different approaches and…

Contract Risk Analysis: Data Breach/Incidence Response Management

Organizations need to know how to efficiently and precisely review and analyze contracts (including contracts with customers or vendors) to conduct risk analysis and risk assessments to determine whether:  (i) their contracts contain necessary provisions relating to data privacy and security requirements; address pre and post data breach notification and incident response procedures and liability;…

Third Party Risk Management: Lifting the Security of Small Firms

Third Party risk management is commonly seen through the lens of risk assessment and mitigation. This is very often appropriate. But given the asymmetric relationship between large customers and a cast number of small sub-contractors/suppliers, we need to consider cybersecurity assessments of small firms through the lens of raising awareness. The session will explore using…