Supply chains are integral to how businesses operate today and they are becoming increasingly complex. As organisations share more and more information with third parties and offer multiple communication channels to clients, they are at increased risk of compromise. Third parties have their own supply chains over which you have no control. If a third party supplier or one of their third parties suffers a breach, you are still liable for your data. Do you know where your data is stored and what are the implications for data protection and compliance? How do you manage your third party suppliers and enforce your standards and controls? And do you really know where the end of your supply chain is?
This session will provide you with a checklist of practical hints and tips to enable you to assess the security of your supply chain and identify practical measures to secure it. The panel will share real life examples and best practice, ensuring that you are equipped with the knowledge and know-how to secure data in your supply chain.
- Learn how to assess third parties and conduct a thorough risk assessment
- Establish how to exchange information with third parties as securely as possible
- Benefit from practical hints and tips on how to manage the third party of a third party
- Understand what sort of identity and access management you should have in place
- Identify appropriate governance strategies to secure data in your supply chain
- Find out what standards, checks and controls are appropriate for measuring third party security
- Discover how to build controls into contracts