
Published 5/2025
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Language: English | Duration: 2h 17m | Size: 1.71 GB
A comprehensive guide to cyber security third party risk
What you'll learn
Gain a comprehensive understanding of Cyber Security Third Party Risk
Understand the regulatory and business drivers for managing cyber security third party risk
Understand inherent risk and how to use it to prioritise or tier third parties for review
Gain insights into conducting effective due diligence of a third party's cyber security practices
Learn tips on how to effectively deal with third party risks identified following the review
Requirements
No prior knowledge of cyber security third party risk is required, however an understanding of cyber security or cyber risk would be helpful.
Description
Understand why Cyber Security Third Party Risk Management is so important for organisations and what steps your organisation needs to take.You will get a firm grasp of the cyber security third party risk today's organisations face and what steps organisations and industries like yours can take to help manage this risk and protect themselves.· Gain a solid understanding of the background and context to Cyber Security Third Party Risk, by looking at the Cyber Security and Third Party Risk backgrounds, and how they "meld" together.· Learn about the importance of cyber security third party risk for organisations, and see how some of the latest high profile security breaches on organisations have been a result of their third party relationships· Learn how to assess cyber security third party risk associated with your suppliers and the services their provide. Understand the concepts of Inherent Risk how to assess this using "CIA Triad" of confidentiality , integrity and availability and how we can use these to prioritise due diligence activities.· Learn what key standards and regulations require organisations to do regarding cyber security third party risk, including ISO 27000, PCI DSS, Cyber Essentials, the GDPR, DORA and NIS 2.· Learn about the different approaches to undertake due diligence of your third party's cyber security posture, including design tips for custom questionnaires, and how to gain the most from SOC 2 reports and third party ISO 27001 certifications. · Learn about the importance of legal contracts in addressing cyber security third party risk, and the importance of contract negotiation· Understand and see samples of the documentation your cyber security third party risk management programme will require including samples of policy, procedures and templates.· Learn about the importance of communications with suppliers and key stakeholders during the cyber risk third party risk management lifecycle, and how to manage the remediation of gaps within your third party's security controls measures.
Who this course is for
Professionals in Information or Cyber Security
Procurement or sourcing teams, business stakeholders and others who own or manage the services and relationships with third parties
Students or graduates in a Cyber Security discipline, or IT professionals who wish to increase their knowledge of this highly relevant cyber security topic
Homepage:
- Code: Alles selecteren
https://www.udemy.com/course/cyber-security-third-party-risk/
Screenshots

Download link
rapidgator.net:
https://rapidgator.net/file/d3e477c694d ... 1.rar.html
https://rapidgator.net/file/7f7cd6ac340 ... 2.rar.html
nitroflare.com:
https://nitroflare.com/view/5CA895C1885 ... .part1.rar
https://nitroflare.com/view/586B9895BAD ... .part2.rar