1. Types of Risks in Third-Party Involvement
2. Third-Party Technology Risk Management
3. Vendor Onboarding Due Diligence and Vendor Audit Practices
Our Flexible Schedule offers you control over the course duration—finish in a day or spread it over three months. Fixed modules ensure structured learning, tailored entirely to your availability.
1 Subject
6 Learning Materials
20 Courses • 228 Students
Ms Ramaswamy holds a B.Tech in Electronics and Communication and a MSc in Software Systems from BITS Pilani. In her earlier role, Jyothi was Governance, Risk & Compliance Lead for Cyber Security Services at TCS and has experience in Information Security control, implementation, and verification. Jyothi holds CRISP, CRISC, CISM certifications and is an APMG accredited trainer.
If you're involved in managing IT systems or overseeing technology-related decisions, this course equips you with the knowledge to assess, mitigate, and manage risks associated with third-party vendors, ensuring secure and reliable operations.
This course is designed for professionals responsible for selecting, contracting, and managing external vendors. It provides essential insights into evaluating vendor risks, ensuring compliance, and maintaining robust third-party relationships that align with organizational standards.
Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.
By clicking on Continue, I accept the Terms & Conditions,
Privacy Policy & Refund Policy