Managing Third-Party Risk

Author: ISACA
Date Published: 18 September 2019

Third-party vendors are integral to delivering products and services for many enterprises, and this can pose a risk to the organization itself. Enterprises must be diligent in fostering safe and healthy relationships with suppliers and be accountable for their own data protection. This requires sound governance and risk management processes integrated into the enterprise and IT business practices.

To learn how to integrate third-party risk management into the overall enterprise risk management (ERM) plan, attend the “How to Manage Third-Party Risk for Better Enterprise Risk Management” webinar presented by ISACA and OneTrust. In this webinar, Kelsey Naschek, CIPM, CIPP/E, privacy engineer at OneTrust, will cover the key processes organizations should undertake to manage vendor risk and the best practices they can put in place when assessing, onboarding, monitoring and offboarding third-party vendors. ISACA members can earn 1 continuing professional education (CPE) hour by attending this webinar and completing a related survey.

In her role at OneTrust, which is one of the largest and most widely used technology platforms to operationalize privacy, security and third-party risk management, Naschek advises leading organizations on the California Consumer Privacy Act (CCPA), the EU General Data Protection Regulation (GDPR) and ePrivacy Directive (Cookie Law) solution implementations, focusing on formulating efficient and effective responses to data protection requirements and building scalable global privacy programs. With more than 5 years of professional IT experience, Naschek’s background combines extensive crossfunctional solution implementations and program management with business process design. She will use her experience to guide you on how best to manage your enterprise’s third-party vendors.

To learn more about this webinar or to register for it, visit the How to Manage Third-Party Risk for Better Enterprise Risk Management page of the ISACA website. You can also learn more on this topic by downloading the complimentary Managing Third-Party Risk: Cyberrisk Practices for Better Enterprise Risk Management white paper.