ComplianceOnline

Third Party Information Security Assessment

Instructor: Alexandro Fernandez
Product ID: 702674
Training Level: Intermediate
  • Duration: 60 Min

recorded version

$149.00
1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section
Last Recorded Date: Jan-2013

Training CD / USB Drive

$199.00
One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367

Email: customercare@complianceonline.com

Read Frequently Asked Questions

This webinar on information security assessment will highlight the principal steps/ methodology for performing a third party information security assessment.

Why Should You Attend:

Companies recognize that information protection requires close cooperation between them and its suppliers, vendors and partners.

This presentation outlines the most important and relevant steps needed to safeguard a company’s information from unauthorized or accidental modification, damage, destruction, or disclosure in an environment that we don’t have total control over it. It covers the main benefits and constraints that we can face while evaluating the information security controls in a third party. Also, we will discuss about the use of ISO 27002 as a best practice for evaluating the existence of information security controls in an external organization. We also will see how this methodology can assist organizations in understanding the security risks and threats that may exist within their environment. We will review the three phases that must be conducted in order to understand and evaluate the information security environment of the third party.

We will discuss the practicality of these methodology and the implementation factors. We will examine an example and how this methodology was tested.

Areas covered in this webinar:

  • Importance of Third party Information security Assessment.
  • Phases of Methodology.
    • Pre assessment
    • During assessment
    • Post assessment
  • Benefits and constraints
  • Roles and responsibilities
  • Checklist
  • Example

Who Will Benefit:

  • IT Auditors
  • Chief Information Security Officers
  • Chief security officers
  • ISO 27001 Lead auditors
  • Security professionals
  • IT Risk managers and professionals
  • Staff with roles and responsibilities in vendor management.

Instructor Profile:

Alexandro , has more than 14 years of working experience in IT and more than 10 fully dedicated to information security. With bachelor degree in computer science, a diploma in telecommunications and other one in management skills. With nine professional and International certifications in areas related to Information Security, Information systems Audit and Information technology. Experience working with multicultural teams across the world in countries like Poland, Hungary, Holland, India, Spain, Argentina, Chile, Colombia, Venezuela and the USA. Knowledge of different platforms and technologies, professional career development in banking, consumer and telecom industry. ISO 27001 Lead Auditor, public speaker and International instructor for Information Security and IT Governance certifications.

Topic Background:

When companies decide to share information with suppliers, vendors or partners to keep the business running, in that moment we are about to open the “Pandora Box” because of the risks that can emerge from sharing our information with external parties.

Because of this, companies have to make sure that their information is protected at all time, during transport, consult and at rest. It has to be handled properly in the most secure way.

One of the most critical success factors for performing an information security assessment is the identification of possible gaps between the security of the third party and the company security posture. We must identify those gaps and demand the third party to close them as soon as possible, because these risks can damage the company’s information assets and also, it can damage its reputation.

Follow us :
World Class Cyber Incident Response Plans: Strong Responses to Attacks
Case Management Boot Camp: Best Practice Strategies For Success

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email customercare@complianceonline.com call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed
    Loading