dots bg

Third Party Risk Management

This course focuses on identifying, assessing, and mitigating risks that arise from third-party engagements, including technology-related risks and vendor management practices. Participants will learn how to conduct effective due diligence, manage vendor relationships, and ensure compliance with risk management standards. The course is ideal for IT teams, middle management, and vendor management or purchase teams, who are responsible for overseeing third-party interactions.

Course Instructor Jyothi Ramaswamy
dots bg

Course Overview

Main Topics Covered:

1.   Types of Risks in Third-Party Involvement

  • Understanding the different categories of risks associated with third parties, including operational, legal, and reputational risks.
  • Best practices for identifying and categorizing risks.

2.   Third-Party Technology Risk Management

  • Assessing technology-related risks such as data breaches, cyber threats, and system failures that could arise from third-party services.
  • Implementing strategies to manage these risks effectively.

3.   Vendor Onboarding Due Diligence and Vendor Audit Practices

  • Conducting thorough due diligence during vendor onboarding to ensure they meet security and compliance standards.
  • Regular vendor audits and assessments to monitor ongoing risks and performance.

Course Duration

  • Morning Session: 10:00 A.M to 01:00 P.M
  • Afternoon Session: 02:00 P.M to 05:00 P.M

Batch Size: 5 participants

Schedule of Classes

Course Curriculum

1 Subject

Third Party Risk Management

6 Learning Materials

Module 1 - Introduction to Third Party Risk Management

Introduction to Third Party Risk Management

Audio

Module 2 - Types of Risks Involving Third Parties

Types of Risks Involving Third Parties

Audio

Module 3 - Third Party Technology Risk Management

Third Party Technology Risk Management

Audio

Module 4 - Vendor Onboarding and Due Diligence

Vendor Onboarding and Due Diligence

Audio

Module 5 - Vendor Auditing Practices

Vendor Auditing Practices

Audio

Module 6 - Continuous Vendor Risk Monitoring

Continuous Vendor Risk Monitoring

Audio

Assessment

Course Instructor

tutor image

Jyothi Ramaswamy

16 Courses   •   5 Students

Jyothi Ramaswamy is a seasoned cybersecurity professional with over 25 years of experience at Tata Consultancy Services (TCS), including 15 years in information security and cybersecurity. She holds a BTech in Electronics, an MS in Software Systems, and certifications like CISM, CRISC, and CRISP. Jyothi specializes in security awareness programs and risk management.

Who Should Enroll

01

IT Team / Middle Management Team

If you're involved in managing IT systems or overseeing technology-related decisions, this course equips you with the knowledge to assess, mitigate, and manage risks associated with third-party vendors, ensuring secure and reliable operations.

02

Vendor Management Team / Purchase Team

This course is designed for professionals responsible for selecting, contracting, and managing external vendors. It provides essential insights into evaluating vendor risks, ensuring compliance, and maintaining robust third-party relationships that align with organizational standards.

Assessment & Certificate

Upon completion of the program and successfully passing the assessment, learners will receive a GCA certificate. The certificate will also indicate the number of hours, which can be used toward meeting Continuing Professional Education (CPE) requirements.