Most organisations work with third-parties to varying degrees - from simple hire-ins to complex open-source integrations in the critical value chain. There is always inherent risk in allowing third-parties access into your organisation.

Ensuring that this is done with an acceptable risk level can often be challenging. In this webinar, we will explore some of the key assumptions that need to be addressed in order to have efficient governance systems, and the main benefits and disadvantages of using soft (high-level) or hard (controls) security requirements when evaluating third-parties’ security maturity.