Securing Critical Data: Best Practices in Vendor Security & Policy Compliance
Time: 10:00 am
day: Day Two
Details:
- Effective risk assessment methodologies to determine value of information/data
- Key security considerations for third-party evaluation/assessment
- Strategies for mitigating risks associated with sensitive data handling and maintaining compliance with regulatory requirements