The hidden threat: Managing AI vendor and third-party risk before it hits
Published: 3 June 2025
As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.
Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.
The hidden threat: Managing AI vendor and third-party risk before it hits

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
The hidden threat: Managing AI vendor and third-party risk before it hits
Published: 3 June 2025
Contributors:
Anthony Prestia
Vice President, Privacy, TerraTrue
Dareus Robinson
Product Counsel
CIPP/E, CIPP/US, CIPM, CIPT, FIP
Prabhath Karanth
Chief Security Officer & CIO, Greenlight
CIPT
As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.
Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.
The hidden threat: Managing AI vendor and third-party risk before it hits

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
Tags: