Cover Image for When Cyber Trouble Comes Through a Vendor
Cover Image for When Cyber Trouble Comes Through a Vendor
Avatar for Cherry Hill Advisory
Hosted By
Registration
Welcome! To join the event, please register below.
About Event

This session explains how vendor relationships become cyber weak spots. We walk through real examples of third parties causing service outages, data leaks, and access failures. Auditors learn how shared responsibility works in practice, how to review contract terms that matter, where monitoring usually falls short, and how to test vendors with real impact on systems and data. The focus is on clear, practical checks that internal audit can run even without a deep security background.

NASBA Field of Study: Information Technology

Key Learning Objectives:

  • Link cyber and vendor risk into one review.

  • Spot contract gaps and risky access paths.

  • Test vendors with real cyber exposure.

Location
Virtual | Link will be provided close to the date
Avatar for Cherry Hill Advisory
Hosted By