Webinar   |   September 10 at 12 p.m.ET

Hardening Your Supply Chain Against Third-Party Threats

Supply chains are increasingly being targeted by cyber threat actors as effective means of breaching even the most secure enterprise organizations.  A recent Gartner report predicts that “by 2026, third-party cyber-risk program performance will be a standing agenda item for 50% of board committees globally.” In partnering with enterprises to reduce their third-party breach risk, BlueVoyant  has identified key vulnerabilities and misconfigurations that are common vectors for third-party breaches. 

Securing your expansive attack surface beyond traditional perimeters requires a strategic and focused approach. In addition to being aware of attacker tactics, security leaders must embrace third-party risk management (TPRM) programs to fortify their external attack surface against these sophisticated threat actors. 

Join us on September 10 for part 2 of this webinar series to learn: 

  • Best practices and strategies for building an effective TPRM program
  • Techniques to evaluate, monitor, and defend third-party vendors from compromise, strengthening your organization’s security posture
  • Insights from a Fortune 500 enterprise case study, highlighting common vulnerabilities affecting its third-party vendors 

If you missed part 1, catch up by watching it here

Speakers

Brendan Conlon Cobalt
Brendan Conlon
Global Director of Supply Chain Defense
BlueVoyant
Lorri Janssen Anessi
Lorri Janssen-Anessi
Director of External Cybersecurity Assessments
BlueVoyant