Third‑Party Risk Management for Cybersecurity & Compliance
Published 10/2025
Duration: 4h 20m | .MP4 1280x720 30 fps(r) | AAC, 44100 Hz, 2ch | 1.26 GB
Genre: eLearning | Language: English
Published 10/2025
Duration: 4h 20m | .MP4 1280x720 30 fps(r) | AAC, 44100 Hz, 2ch | 1.26 GB
Genre: eLearning | Language: English
Learn TPRM frameworks, vendor risk scoring, contracts, monitoring & response to safeguard against cyber threats.
What you'll learn
- Define third-party risk management and why it’s a top compliance priority
- Apply global TPRM frameworks (ISO 27036, NIST 800-161, ISO 27001)
- Map vendor onboarding, due diligence, and risk scoring processes
- Draft contracts with strong cybersecurity clauses and audit rights
- Use continuous monitoring tools to track vendor risk in real time
- Build and test an incident response plan for vendor breaches
Requirements
- Basic understanding of cybersecurity and compliance concepts
- No prior experience in third-party risk management required
Description
“This course contains the use of artificial intelligence.”
Third-Party Risk Management (TPRM)has become one of the biggest priorities in today’s cybersecurity and compliance landscape. Vendors, suppliers, and service providers are deeply embedded in every business process—but they also introduce hidden risks. A 2024 industry report revealed that61% of organizations experienced a third-party security incident within a year, making vendor-related breaches one of the fastest-growing threats worldwide.
This course provides acomplete, practical, and compliance-focused guide to Third-Party Risk Management. Whether you are a cybersecurity professional, compliance officer, procurement manager, or business leader, you’ll gain the knowledge and tools to assess, monitor, and mitigate vendor risks effectively.
You will learn thefull TPRM lifecycle—fromvendor onboarding, due diligence, and risk scoringtocontract negotiation, continuous monitoring, and incident response planning.We’ll dive intoindustry frameworkssuch asISO/IEC 27036, NIST 800-161, and ISO 27001, and explore how to align with global regulations likeNIS2, DORA, and CSDDD.
To make the learning experience practical and actionable, the course includes:
Step-by-step vendor assessment and risk scoring exercises
Contract review workshopswith essential cybersecurity clauses
Tabletop simulationsof third-party breach scenarios
Case studiesof real-world incidents such as MOVEit and financial services vendor breaches
By the end of this course, you will be able to:
Build a robust TPRM program that reduces risk exposure
Embed security safeguards into contracts and vendor agreements
Implementcontinuous monitoringtools for proactive defense
Lead effectiveincident response and recovery effortswhen vendors are breached
Demonstrate compliance with international standards and regulatory expectations
With a strong focus oncybersecurity, compliance, and risk management, this course equips you with both the strategic mindset and practical skills to safeguard your organization against evolving third-party threats.
Who this course is for:
- Cybersecurity professionals expanding into supply chain and vendor risk management
- Compliance officers, auditors, and legal teams handling third-party oversight
- IT and procurement managers responsible for vendor selection and contracts
- Business leaders and board members accountable for regulatory compliance
- Anyone seeking to build or strengthen a TPRM program within their organization
More Info