Securing Critical Data: Best Practices in Vendor Security & Policy Compliance

Time: 10:00 am
day: Day Two

Details:

  • Effective risk assessment methodologies to determine value of information/data
  • Key security considerations for third-party evaluation/assessment
  • Strategies for mitigating risks associated with sensitive data handling and maintaining compliance with regulatory requirements

Speakers: