Third Party Supplier Governance – Secure the Supply Chain

  • Thursday, April 23, 2015 | 10:20 AM – 11:10 AM | West | Room: 3002

View all Sessions

Enterprises are increasingly using third party suppliers for the provision of core services. With the recent spate of data breaches originating from third parties, how do enterprises ensure their data supply chain is safe and appropriate controls are in place? What models have been implemented to articulate risk of third party suppliers and how has risk posture been communicated to the Board.


Related Blog Posts

This document was retrieved from on Sat, 22 Oct 2016 09:28:07 -0400.
© 2016 EMC Corporation. All rights reserved.