Reciprocity: Key Steps to Managing 3rd-Party Risk

Reciprocity: Key Steps to Managing 3rd-Party Risk

 ET
Online

While external vendors provide invaluable services, they also introduce significant risk to your company’s information security. How do you know if your vendors are meeting required contractual, security and privacy obligations?

Without the processes in place to assess third-party risks, then it’s likely that you don’t. This is critical: you need to know the risks of working with third parties and that you can trust them — because if they go down, so may your business.

Assessing risk, however, can be incredibly complex. Manual processes and spreadsheets are not scalable. Learn how to automate your processes and achieve continuous risk monitoring.

Jenny Victor, VP of Marketing, Reciprocity

Jenny Victor has 20 years of product and corporate marketing experience in the technology sector. Prior to joining Reciprocity, Jenny served as Vice President, Industry, GTM and Enablement for OpenText where she led Industry Marketing, Customer Marketing and Strategic Sales Enablement and was responsible for improving and optimizing go-to-market effectiveness. Prior to that role she held product marketing leadership roles at OpenText, Aria Systems, Pivotlink, Vitria Technology, IBM and WageWorks. She holds an MBA from the Kelley School of Business at Indiana University and a BA in Economics from the University of California at Davis.