Risk management vector illustration. Concept with icons related to risk analysis or risk assessment and identification in business, in a company or in finance.

On demand webinar: Essentials of third-party risk management

Mitigate risk. Boost security.

Having a solid cybersecurity plan is crucial now more than ever. So how do you ensure your data is protected to the best of your ability?  

A third-party risk management (TPRM) program may be a critical element to your cybersecurity plan.  

This raises some questions. To what extent should you involve a TPRM program? What information do you include in your contracts? 

Ricoh Chief Information Security Officer, David Levine, shares answers to these questions and more in the webinar Third-party risk management: The good, the bad and the ugly.

Gain insight on:

  • The benefits of third-party risk management

  • What challenges are being faced with TPRM programs today

  • Recommendations on what’s needed along with best practices

  • Independent risk scoring solutions and how practitioners can use them

Explore our content library

Recommended for you

Cyber Attacks - 5 strategies to protect your healthcare organization
Cyber Attacks - 5 strategies to protect your healthcare organization

Cyber Attacks - 5 strategies to protect your healthcare organization

Cyber attacks create serious - even deadly - disruption for healthcare organizations. This white paper by Ricoh shares 5 strategies to improve healthcare cybersecurity.

Data Risk Assessment Checklist
Data Risk Assessment Checklist

Data Risk Assessment Checklist

Learn how to conduct a content risk assessment, identify critical data that is exposed and put a plan in place to avoid security breaches.

Taking ransomware risk off the table
Taking ransomware risk off the table

Taking ransomware risk off the table

How Ricoh's ransomware solution reduces cybersecurity risk for the Town of North Andover.