Checking the Boxes on Vendor Cybersecurity Assessments

The webinar has ended

With more sophisticated cyber attacks targeting small and midsized organizations, larger enterprises are now requiring data security assessments prior to doing business. How do you know if you can check the boxes of a 3rd party cybersecurity assessment? Join Iron Mountain and Defendify to find out.

How do you know if you can check the boxes of a 3rd party cybersecurity assessment?

With more sophisticated cyber attacks targeting small and midsized organizations, larger enterprises are now requiring data security assessments prior to doing business. How do you know if you can check the boxes of a 3rd party cybersecurity assessment?

Iron Mountain’s VP of Information Security, Seth Bailey, and Jenna Wells, Director of Third Party Risk Management, together break down typical assessment requirements, and how small and midsized organizations can proactively prepare for one.

Moderated by 20+ year security veteran and Co-Founder of Defendify, Rob Simopoulos, you will also learn when to expect a 3rd party cybersecurity assessment, and how you can check your own vendor’s cybersecurity posture.

Key takeaways include:

  • What a 3rd party cybersecurity assessment is, and when can you expect to get one
  • What steps can small and midsized organizations take to prepare for 3rd party cybersecurity assessments
  • How to assess the strength your vendors’ cybersecurity to ensure your data won’t risk a compromise


Hosted by ActualTech Media

Expert Presenters
ActualTech Media

ActualTech Media

Free resources

Free Compromised Password Scan

Automate scanning of the dark web for stolen passwords so you can protect email accounts and credentials found from malicious activity.

Defendify Essentials Package

See where you stand and get in-the-know with multiple layers of security in a single solution. Nothing to install. Nothing to pay for.

Resources & insights

Webinar
Cybersecurity Compliance: Expert Tips from the former CIO of the CIA
Learn learn how to proactively meet customer, industry and government security regulations with Alan Wade, the former Chief Information Officer (CIO) at the U.S. Central Intelligence Agency (CIA) and Defendify.
Blog
Cybersecurity Risk Assessments Are Coming, Be Prepared (As Featured on Business.com) 
It’s a typical morning and you get an urgent call from a client: they received a third-party risk assessment from their biggest customer. “We can’t afford to lose this customer,” they share, “We have all of this in place, right?” You scroll through the document: hundreds of questions on each component of their cybersecurity program, from technology to training. What do you do?
Cybersecurity can no longer be an afterthought
Blog
Defendify Offers Free Essentials Package to Help Businesses Check and Improve Cybersecurity Posture 
Defendify recently announced they attribute a surge in new Cybersecurity Essentials package sign-ups to the increase in cybercriminal activity targeting small and mid-sized businesses. The package, released in late-March, offers three award-winning cybersecurity tools that help businesses understand what data security vulnerabilities and threats might impact their organization, and next steps for remediation.

Protect and defend with multiple layers of cybersecurity

Faster. Smarter. Stronger.

Explore layered
security

Learn more about Defendify’s three key layers and All-In-One cybersecurity.

How can we help?

Schedule time to talk to a cybersecurity expert to discuss your needs.

See how it works

See how Defendify’s platform, modules, and expertise work to improve security posture.