VIDEO

The hidden threat: Managing AI vendor and third-party risk before it hits


Published: 3 June 2025

Brought to you by TerraTrue

As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.

Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.

The hidden threat: Managing AI vendor and third-party risk before it hits

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Prabhath Karanth

CIPT

Chief Security Officer & CIO

Greenlight

Anthony Prestia

Vice President, Privacy

TerraTrue

Dareus Robinson

CIPP/E, CIPP/US, CIPM, CIPT, FIP

Product Counsel


Tags:

AI and machine learningProgram managementRisk managementProfessional servicesTechnologyPrivacyAI governance
VIDEO

The hidden threat: Managing AI vendor and third-party risk before it hits

Published: 3 June 2025


Contributors:

Prabhath Karanth

CIPT

Chief Security Officer & CIO

Greenlight

Anthony Prestia

Vice President, Privacy

TerraTrue

Dareus Robinson

CIPP/E, CIPP/US, CIPM, CIPT, FIP

Product Counsel


Brought to you by TerraTrue

As AI adoption accelerates, so does the complexity of your vendor ecosystem. Hidden risks — from opaque AI training practices to evolving regulatory expectations — can expose your business to reputational damage, security incidents and privacy violations before you even realize they exist.

Join our expert-led webinar to learn how leading security and privacy teams are moving from reactive checklists to proactive, embedded risk management. You will discover how to integrate security and privacy by design into your vendor selection, onboarding and review workflows to stay ahead of emerging threats.

The hidden threat: Managing AI vendor and third-party risk before it hits

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Tags:

AI and machine learningProgram managementRisk managementProfessional servicesTechnologyPrivacyAI governance

Related resources