Third Party Information Security Assessment

Speaker

Instructor: Alexandro Fernandez
Product ID: 702674
Training Level: Intermediate

Location
  • Duration: 60 Min
This webinar on information security assessment will highlight the principal steps/ methodology for performing a third party information security assessment.
RECORDED TRAINING
Last Recorded Date: Jan-2013

 

$149.00
1 Person Unlimited viewing for 6 month info Recorded Link and Ref. material will be available in My CO Section
(For multiple locations contact Customer Care)

$199.00
Downloadable file is for usage in one location only. info Downloadable link along with the materials will be emailed within 2 business days
(For multiple locations contact Customer Care)

 

 

Customer Care

Fax: +1-650-362-2367

Email: [email protected]

Read Frequently Asked Questions

Why Should You Attend:

Companies recognize that information protection requires close cooperation between them and its suppliers, vendors and partners.

This presentation outlines the most important and relevant steps needed to safeguard a company’s information from unauthorized or accidental modification, damage, destruction, or disclosure in an environment that we don’t have total control over it. It covers the main benefits and constraints that we can face while evaluating the information security controls in a third party. Also, we will discuss about the use of ISO 27002 as a best practice for evaluating the existence of information security controls in an external organization. We also will see how this methodology can assist organizations in understanding the security risks and threats that may exist within their environment. We will review the three phases that must be conducted in order to understand and evaluate the information security environment of the third party.

We will discuss the practicality of these methodology and the implementation factors. We will examine an example and how this methodology was tested.

Areas covered in this webinar:

  • Importance of Third party Information security Assessment.
  • Phases of Methodology.
    • Pre assessment
    • During assessment
    • Post assessment
  • Benefits and constraints
  • Roles and responsibilities
  • Checklist
  • Example

Who Will Benefit:

  • IT Auditors
  • Chief Information Security Officers
  • Chief security officers
  • ISO 27001 Lead auditors
  • Security professionals
  • IT Risk managers and professionals
  • Staff with roles and responsibilities in vendor management.

Instructor Profile:

Alexandro , has more than 14 years of working experience in IT and more than 10 fully dedicated to information security. With bachelor degree in computer science, a diploma in telecommunications and other one in management skills. With nine professional and International certifications in areas related to Information Security, Information systems Audit and Information technology. Experience working with multicultural teams across the world in countries like Poland, Hungary, Holland, India, Spain, Argentina, Chile, Colombia, Venezuela and the USA. Knowledge of different platforms and technologies, professional career development in banking, consumer and telecom industry. ISO 27001 Lead Auditor, public speaker and International instructor for Information Security and IT Governance certifications.

Topic Background:

When companies decide to share information with suppliers, vendors or partners to keep the business running, in that moment we are about to open the “Pandora Box” because of the risks that can emerge from sharing our information with external parties.

Because of this, companies have to make sure that their information is protected at all time, during transport, consult and at rest. It has to be handled properly in the most secure way.

One of the most critical success factors for performing an information security assessment is the identification of possible gaps between the security of the third party and the company security posture. We must identify those gaps and demand the third party to close them as soon as possible, because these risks can damage the company’s information assets and also, it can damage its reputation.

Follow us :

 

 

Refund Policy

Our refund policy is governed by individual products and services refund policy mentioned against each of offerings. However in absence of specific refund policy of an offering below refund policy will be effective.
Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange. Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time. On-Demand Recording purchases will not be refunded as it is available for immediate streaming. However if you are not able to view the webinar or you have any concern about the content of the webinar please contact us at below email or by call mentioning your feedback for resolution of the matter. We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email [email protected] call +1-888-717-2436 (Toll Free).

 

 

+1-888-717-2436

6201 America Center Drive Suite 240, San Jose, CA 95002, USA

Follow Us

facebook twitter linkedin youtube

 

Copyright © 2023 ComplianceOnline.com MetricStream
Our Policies: Terms of use | Privacy

PAYMENT METHOD: 100% Secure Transaction

payment method