Third Party Risk Management (Tprm) Complete Course

Posted By: ELK1nG

Third Party Risk Management (Tprm) Complete Course
Published 10/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 441.87 MB | Duration: 3h 24m

Vendor Risk Management | TPRM Lifecycle | GRC | IT Audit

What you'll learn

Third Party Risk Management

Third Party Risk Management Lifecycle

Planning and preparation

Selection and Due Diligence

Contract Negotiation and Onboarding

Incident Management and Response

Termination and Offboarding

Continuous Monitoring

Requirements

Laptop, Desktop required to view and participate in lessons

Enthusiastic about learning about learning how to perform a Risk Assessment

Description

In today's interconnected world, third-party relationships are essential for business success. However, these relationships can also expose organizations to significant risks—cyber threats, data breaches, regulatory non-compliance, financial loss, operational disruptions and reputational damage.Introducing the comprehensive "Third Party Risk Management" course!Gain the expertise needed to effectively manage and mitigate the risks associated with third-party vendors and partners.What Will You Learn?Understanding Third Party Risk: Define and assess the different types of third-party risks, from financial to cybersecurity.The TPRM Lifecycle: Learn about the complete lifecycle of third-party risk management, including due diligence, contracting, performance tracking, risk monitoring, and offboarding.Vendor Due Diligence: Understand how to effectively perform due diligence when onboarding new third-party vendors.Incident Management & Response: Gain skills in developing incident response plans for third-party breaches and understand how to recover quickly.Regulatory Compliance: Master the key regulatory requirements related to third-party risks, including GDPR, CCPA, SOC 2, PCI DSS, and Sarbanes Oxley (SOX).TPRM Governance: Understand governance frameworks that align with the organization’s risk appetite and tolerance.Risk Assessment Techniques: Learn how to evaluate third-party risks using industry-leading frameworks like NIST, ISO 27001, COSO ERM, and Shared Assessments SIG.Who Should Enroll:Students, IT Professionals, Starting or Changing career into ITAnyone interested in pursuing a career in Third Party Risk ManagementIT professionalsRisk AnalystIT Security AnalystIT Compliance AnalystCyber Security ProfessionalsIT AuditorsIT Control TestersInformation Security ProfessionalsDon't Miss Out - Enroll Today! Invest in your future and take your career to new heights with the Third-Party Risk Management Complete Course. Join thousands of satisfied students who have transformed their careers with our industry-leading training.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Understanding Third Party Risk Management (TPRM)

Lecture 3 Types of Third Party Relationships

Lecture 4 Benefits of Third Party Relationships

Lecture 5 Challenges With Managing Third Party Relationships

Lecture 6 Third Party Risks

Lecture 7 Inherent Risks

Lecture 8 Residual Risks

Lecture 9 Udemy Review System

Lecture 10 Resources and Recommendations

Lecture 11 Types of Third Party Risks

Section 2: Third Party Risk Management Program

Lecture 12 TPRM Program

Lecture 13 Governance & Third Party Risk Management

Lecture 14 TPRM Risk Management Framework (RMF)

Lecture 15 NIST Cybersecurity Framework (CSF) 2.0

Lecture 16 NIST Special Publication 800-53

Lecture 17 ISO27001 Framework

Lecture 18 COSO Framework

Lecture 19 SIG Questionnaire

Lecture 20 Risk Appetite

Lecture 21 TPRM Teams - Roles & Responsibilities I

Lecture 22 TPRM Teams - Roles & Reponsibilities II

Lecture 23 Regulatory Compliance

Section 3: Planning & Scoping

Lecture 24 Third Party Risk Management Lifecycle

Lecture 25 Planning & Scoping

Lecture 26 Identifying Potential Vendors

Lecture 27 Request for Proposal (RFP)

Lecture 28 Request for Information (RFI)

Section 4: Selection & Due Diligence - Part 1

Lecture 29 Selection & Due Diligence

Lecture 30 Criticality & Inherent Risk

Lecture 31 Due Diligence Activities

Lecture 32 Third Party Profile

Lecture 33 Inherent Risk Questionnaire

Lecture 34 Risk Assessment & Due Diligence

Lecture 35 Risk Assessment

Section 5: Selection & Due Diligence - Part 2

Lecture 36 Information Security Risk Assessment

Lecture 37 Operational Risk Assessment

Lecture 38 Human Resources Risk Assessment

Lecture 39 Privacy & Data Protection Risk Assessment

Lecture 40 Compliance Risk Assessment

Lecture 41 Financial Risk Assessment

Lecture 42 Vendor Risk Management Framework

Lecture 43 Fourth Party Assessment

Lecture 44 Risk Identification

Lecture 45 Risk Treatment / Response

Lecture 46 Risk Assessment Report

Lecture 47 Service Organization Controls (SOC)

Lecture 48 SOC Categories and Types

Lecture 49 Understanding SOC Reports

Lecture 50 Reviewing SOC Reports

Section 6: Contract Management

Lecture 51 Contract Management

Lecture 52 Key Stakeholders in Contract Management

Lecture 53 Negotiating Contract Terms

Lecture 54 Contract Review and Approvals

Lecture 55 Ongoing Contract Management

Lecture 56 Key Components of Service Level Agreements (SLAs)

Lecture 57 Key Steps When an SLA is Breach

Section 7: Monitoring & Performance Management

Lecture 58 Monitoring and Performance Tracking 1

Lecture 59 Monitoring and Performance Tracking 2

Lecture 60 Incidence Response Management 1

Lecture 61 Incidence Response Management 2

Section 8: Termination & Offboarding

Lecture 62 Types of Contract Termination

Lecture 63 Termination and Offboarding Process - Part 1

Lecture 64 Termination and Offboarding Process - Part 2

Lecture 65 Best Practices for Effective Termination and Offboarding

Section 9: Continuous Improvement

Lecture 66 Continuous Improvement Activities

Lecture 67 Congratulations

Students, Professionals, Starting or Changing career into IT,Risk Analyst, Cyber Security Analyst, Information Security Analyst, IT Auditor, IT professionals