[align=center]
Third‑party Risk Management For Cybersecurity & Compliance
Published 10/2025
Created by Learnsector LLP
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Intermediate | Genre: eLearning | Language: English | Duration: 20 Lectures ( 4h 19m ) | Size: 1.3 GB[/center]
Learn TPRM frameworks, vendor risk scoring, contracts, monitoring & response to safeguard against cyber threats.
What you'll learn
Define third-party risk management and why it's a top compliance priority
Apply global TPRM frameworks (ISO 27036, NIST 800-161, ISO 27001)
Map vendor onboarding, due diligence, and risk scoring processes
Draft contracts with strong cybersecurity clauses and audit rights
Use continuous monitoring tools to track vendor risk in real time
Build and test an incident response plan for vendor breaches
Requirements
Basic understanding of cybersecurity and compliance concepts
No prior experience in third-party risk management required
Description
"This course contains the use of artificial intelligence."Third-Party Risk Management (TPRM) has become one of the biggest priorities in today's cybersecurity and compliance landscape. Vendors, suppliers, and service providers are deeply embedded in every business process-but they also introduce hidden risks. A 2024 industry report revealed that 61% of organizations experienced a third-party security incident within a year, making vendor-related breaches one of the fastest-growing threats worldwide.This course provides a complete, practical, and compliance-focused guide to Third-Party Risk Management. Whether you are a cybersecurity professional, compliance officer, procurement manager, or business leader, you'll gain the knowledge and tools to assess, monitor, and mitigate vendor risks effectively.You will learn the full TPRM lifecycle-from vendor onboarding, due diligence, and risk scoring to contract negotiation, continuous monitoring, and incident response planning. We'll dive into industry frameworks such as ISO/IEC 27036, NIST 800-161, and ISO 27001, and explore how to align with global regulations like NIS2, DORA, and CSDDD.To make the learning experience practical and actionable, the course includes:Step-by-step vendor assessment and risk scoring exercisesContract review workshops with essential cybersecurity clausesTabletop simulations of third-party breach scenariosCase studies of real-world incidents such as MOVEit and financial services vendor breachesBy the end of this course, you will be able to:Build a robust TPRM program that reduces risk exposureEmbed security safeguards into contracts and vendor agreementsImplement continuous monitoring tools for proactive defenseLead effective incident response and recovery efforts when vendors are breachedDemonstrate compliance with international standards and regulatory expectationsWith a strong focus on cybersecurity, compliance, and risk management, this course equips you with both the strategic mindset and practical skills to safeguard your organization against evolving third-party threats.
Who this course is for
Cybersecurity professionals expanding into supply chain and vendor risk management
Compliance officers, auditors, and legal teams handling third-party oversight
IT and procurement managers responsible for vendor selection and contracts
Business leaders and board members accountable for regulatory compliance
Anyone seeking to build or strengthen a TPRM program within their organization
Homepage
https://way4share.com/4W6p/Third-Party_Risk_Management_for_Cybersecurity__amp__Compliance.part2.rar
https://way4share.com/4W6r/Third-Party_ … .part1.rar