New NIST Framework for Ransomware: What It Means for Third-Party Risk

Resource Third-Party Risk

Recent attacks have made ransomware risk a top-of-mind topic for businesses and their suppliers. In response, the U.S. government took a notable step in cybersecurity policy earlier this year with President Biden’s Executive Order to improve the state of national cybersecurity.  


Now, the Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) has issued a revised draft framework that identifies security objectives to support a risk-based approach to ransomware. 


So, what does this mean to your third-party risk management program? In this webinar, we’ll explore the new Ransomware Profile and discuss what actions you can take to identify vulnerable third parties and reduce the potential and impact of a ransomware attack.  

Attend to learn:  

  • The five key Cybersecurity Framework Functions in the new report 
  • The emphasis on process planning and stakeholder identification 
  • Communication, remediation, and continuity considerations to address with your third parties 
  • Best practices on navigating ransomware risks and managing third parties 

Watch Video

Note: All fields marked with * are required

I’d like email updates on local privacy events and news, resources and products to stay connected with my community. Unsubscribe at any time.

I’d like a solution expert to provide product information or show me a custom demo of the OneTrust platform

How would you like us to contact you?

Privacy Notice

You can learn more about how we handle your personal data and your rights by reviewing our privacy notice.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You Might Also Be Interested In

Privacy Management

5 Steps to Automating FOIA Requests

NOVEMBER 19, 2021

5 Ways to Automate IT Risk Management

WEBINAR | DEC 14, 2021

The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like

DEC 09, 2021

Enhancing Privacy Accountability Through More Effective IT Risk Management

NOVEMBER 18, 2021
Consent and Preferences

The Digital Privacy Experience


China PIPL: Managing & Responding to Data Breaches Under PIPL

Data Governance

China PIPL: Effective Management for the Five PIPL Data Subject Rights

Consent and Preferences

China PIPL: Consent Management for the Collection of Personal Data

Onetrust All Rights Reserved