Article Details

Scrape Timestamp (UTC): 2024-11-12 15:13:32.666

Source: https://www.theregister.com/2024/11/12/managing_thirdparty_risks_in_complex/

Original Article Text

Click to Toggle View

Managing third-party risks in complex IT environments. Key steps to protect your organization’s data from unauthorized external access. Webinar With increasing reliance on contractors, partners, and vendors, managing third-party access to systems and data is a complex security challenge. Join this webinar on December 3rd at 11AM ET to hear more about risks that non-employee identities bring to organizational security. Steve Toole, Principal Solutions Consultant at SailPoint, will be talking to the Reg's Tim Phillips about how to manage and mitigate third-party risk so that you can improve security and compliance. Key areas of discussion include: - Identifying third-party risks: Understanding where risks originate and how they impact security. - Risk mitigation strategies: Steps to manage third-party identities and limit access vulnerabilities. - Building a culture of security and compliance: Encouraging a security-first mindset that includes external partners. This session should prove very useful for IT managers and security professionals aiming to enhance third-party risk management practices. Register here to gain actionable insights into securing your organization's data and systems against third-party access threats. Sponsored by SailPoint.

Daily Brief Summary

MISCELLANEOUS // Effective Strategies for Managing Third-Party IT Security Risks

Increasing engagement with contractors and vendors heightens the risk of unauthorized data access.

The webinar, led by SailPoint's Steve Toole, will address third-party risk management in IT environments.

Key discussion topics will include identifying potential security risks from third parties and appropriate mitigation strategies.

Emphasis will be placed on creating a security-conscious culture that also involves external partners.

IT managers and security professionals will gain insights on securing their data against external threats.

The event aims to enhance practices around the management of third-party access and vulnerabilities.