WEB CONFERENCE

The hidden threat: Managing AI vendor and third-party risk before it hits


Published: 3 June 2025

View upcoming IAPP web conferences

As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.

Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.

The hidden threat: Managing AI vendor and third-party risk before it hits

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Anthony Prestia

Vice President, Privacy, TerraTrue

Dareus Robinson

Product Counsel

CIPP/E, CIPP/US, CIPM, CIPT, FIP

Prabhath Karanth

Chief Security Officer & CIO, Greenlight

CIPT


Tags:

Compliance techIncident managementProgram managementRisk managementAI governancePrivacy
WEB CONFERENCE

The hidden threat: Managing AI vendor and third-party risk before it hits

Published: 3 June 2025

View upcoming IAPP web conferences

Contributors:

Anthony Prestia

Vice President, Privacy, TerraTrue

Dareus Robinson

Product Counsel

CIPP/E, CIPP/US, CIPM, CIPT, FIP

Prabhath Karanth

Chief Security Officer & CIO, Greenlight

CIPT


As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.

Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.

The hidden threat: Managing AI vendor and third-party risk before it hits

CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

Compliance techIncident managementProgram managementRisk managementAI governancePrivacy

Related resources