VIDEO

3 steps to elevating your third-party risk management process


Published: 27 Feb. 2024

Brought to you by TerraTrue

This web conference covers how to triage risk efficiently so you are not the bottleneck in the process, how to incorporate a single source of truth organization-wide so everyone knows which risks require further review and which require little or none, and how to get your legal, privacy and security teams working in sync so there are no surprises or last-minute red flags.

View Presentation

3 steps to elevating your third-party risk management process

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Christopher Anderson

Privacy Counsel, Elasticsearch, Inc.

AIGP, CIPP/E, CIPM, FIP

Chris Handman

Co-founder, Chief Operating Officer, TerraTrue

Angelique Carson

Director of Content Strategy, TerraTrue


Tags:

Incident managementRisk managementProgram managementCybersecurity lawPrivacy
VIDEO

3 steps to elevating your third-party risk management process

Published: 27 Feb. 2024


Contributors:

Christopher Anderson

Privacy Counsel, Elasticsearch, Inc.

AIGP, CIPP/E, CIPM, FIP

Chris Handman

Co-founder, Chief Operating Officer, TerraTrue

Angelique Carson

Director of Content Strategy, TerraTrue


Brought to you by TerraTrue

This web conference covers how to triage risk efficiently so you are not the bottleneck in the process, how to incorporate a single source of truth organization-wide so everyone knows which risks require further review and which require little or none, and how to get your legal, privacy and security teams working in sync so there are no surprises or last-minute red flags.

View Presentation

3 steps to elevating your third-party risk management process

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Incident managementRisk managementProgram managementCybersecurity lawPrivacy

Related resources