The hidden threat: Managing AI vendor and third-party risk before it hits
Published: 3 June 2025
Brought to you by TerraTrue
As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.
Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.
Key takeaways:
- Why AI vendors pose new and unique risks you can't afford to ignore.
- How to implement a proactive "trust-by-design" approach across third-party risk management.
- Real-world examples of AI vendor diligence and third-party vendor management.
- How security, privacy and AI governance teams can align to embed risk management into product and procurement processes.
- What questions to ask vendors today to future-proof your organization.
The hidden threat: Managing AI vendor and third-party risk before it hits

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
The hidden threat: Managing AI vendor and third-party risk before it hits

Published: 3 June 2025
Contributors:
Anthony Prestia
Vice President, Privacy, TerraTrue
Dareus Robinson
Product Counsel
CIPP/E, CIPP/US, CIPM, CIPT, FIP
Prabhath Karanth
Chief Security Officer & CIO, Greenlight
CIPT
Brought to you by TerraTrue
As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.
Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.
Key takeaways:
- Why AI vendors pose new and unique risks you can't afford to ignore.
- How to implement a proactive "trust-by-design" approach across third-party risk management.
- Real-world examples of AI vendor diligence and third-party vendor management.
- How security, privacy and AI governance teams can align to embed risk management into product and procurement processes.
- What questions to ask vendors today to future-proof your organization.
The hidden threat: Managing AI vendor and third-party risk before it hits

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
Tags: