1. Types of Risks in Third-Party Involvement
2. Third-Party Technology Risk Management
3. Vendor Onboarding Due Diligence and Vendor Audit Practices
1 Subject
6 Learning Materials
16 Courses • 5 Students
Jyothi Ramaswamy is a seasoned cybersecurity professional with over 25 years of experience at Tata Consultancy Services (TCS), including 15 years in information security and cybersecurity. She holds a BTech in Electronics, an MS in Software Systems, and certifications like CISM, CRISC, and CRISP. Jyothi specializes in security awareness programs and risk management.
If you're involved in managing IT systems or overseeing technology-related decisions, this course equips you with the knowledge to assess, mitigate, and manage risks associated with third-party vendors, ensuring secure and reliable operations.
This course is designed for professionals responsible for selecting, contracting, and managing external vendors. It provides essential insights into evaluating vendor risks, ensuring compliance, and maintaining robust third-party relationships that align with organizational standards.
Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.
By clicking on Continue, I accept the Terms & Conditions,
Privacy Policy & Refund Policy