<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/5_6DftIv" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Cyber Risk Nation</title>
    <description>Welcome to a nation of like-minded professionals from both sides of the Exchange who are dedicated to cyber risk intelligence. Cyber Risk Nation is your vehicle to establish yourself as an industry thought-leader, connect with other forward-thinking individuals, and deepen your engagement with CyberGRX, all while celebrating your success and getting rewarded.</description>
    <copyright>2023 Cyber Risk Nation</copyright>
    <language>en</language>
    <pubDate>Mon, 15 May 2023 19:11:27 +0000</pubDate>
    <lastBuildDate>Thu, 25 May 2023 18:20:23 +0000</lastBuildDate>
    <image>
      <link>https://cyber-risk-nation.simplecast.com</link>
      <title>Cyber Risk Nation</title>
      <url>https://image.simplecastcdn.com/images/1f0f61d2-c7bd-48d8-8971-f88cce32315d/aeedff25-de02-44a1-a0ed-0afe516a96d7/3000x3000/crn-podcast-logo.jpg?aid=rss_feed</url>
    </image>
    <link>https://cyber-risk-nation.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Welcome to a nation of like-minded professionals from both sides of the Exchange who are dedicated to cyber risk intelligence. Cyber Risk Nation is your vehicle to establish yourself as an industry thought-leader, connect with other forward-thinking individuals, and deepen your engagement with CyberGRX, all while celebrating your success and getting rewarded.</itunes:summary>
    <itunes:author>CyberGRX, Cyber Risk Nation</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/1f0f61d2-c7bd-48d8-8971-f88cce32315d/aeedff25-de02-44a1-a0ed-0afe516a96d7/3000x3000/crn-podcast-logo.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/5_6DftIv</itunes:new-feed-url>
    <itunes:keywords>community, cybersecurity, security</itunes:keywords>
    <itunes:owner>
      <itunes:name>CyberGRX</itunes:name>
      <itunes:email>jessica.jenks@cybergrx.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Business"/>
    <itunes:category text="Education">
      <itunes:category text="Courses"/>
    </itunes:category>
    <itunes:category text="Technology"/>
    <item>
      <guid isPermaLink="false">b5958959-118c-468d-9296-6c76175da157</guid>
      <title>How Far Should You Push the Boundaries in Accelerating Risk Decisions?</title>
      <description><![CDATA[<p>A classic procurement conundrum: thoroughness vs. speed. <br /><br />When contracts get hung up in procurement, it slows down business operations. Yet, evaluating vendors for the potential new risks they are introducing is time-consuming, not to mention cumbersome. How far do you push the boundaries– should you move on from vendors who don’t comply with your assessment requests in a timely manner? Would you use predictive risk data to evaluate vendors and accelerate your decision? </p>
]]></description>
      <pubDate>Mon, 15 May 2023 19:11:27 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Peter Finter, Joanna Soles, Dave Stapleton)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/how-far-should-you-push-the-boundaries-in-accelerating-risk-decisions-ih9fY0G1</link>
      <content:encoded><![CDATA[<p>A classic procurement conundrum: thoroughness vs. speed. <br /><br />When contracts get hung up in procurement, it slows down business operations. Yet, evaluating vendors for the potential new risks they are introducing is time-consuming, not to mention cumbersome. How far do you push the boundaries– should you move on from vendors who don’t comply with your assessment requests in a timely manner? Would you use predictive risk data to evaluate vendors and accelerate your decision? </p>
]]></content:encoded>
      <enclosure length="29148202" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/84655823-6366-4342-9144-af83388ed78d/audio/0aec88e0-a677-4be4-8868-c5d01666dc5b/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>How Far Should You Push the Boundaries in Accelerating Risk Decisions?</itunes:title>
      <itunes:author>Peter Finter, Joanna Soles, Dave Stapleton</itunes:author>
      <itunes:duration>00:30:21</itunes:duration>
      <itunes:summary>Join us as we discuss and debate how to enable your business while also protecting it, particularly as it relates to vetting and onboarding new vendors with our special guest Joanna Soles, Sr. Director of Information Security at PepsiCo, Inc., along with Dave Stapleton, CISO at CyberGRX and Peter Finter, CMO at CyberGRX.</itunes:summary>
      <itunes:subtitle>Join us as we discuss and debate how to enable your business while also protecting it, particularly as it relates to vetting and onboarding new vendors with our special guest Joanna Soles, Sr. Director of Information Security at PepsiCo, Inc., along with Dave Stapleton, CISO at CyberGRX and Peter Finter, CMO at CyberGRX.</itunes:subtitle>
      <itunes:keywords>third-party cyber risk management, cybersecurity, risk decisions, third party risk, vendor, tprm</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">65d34965-e2c2-4830-9545-4af4a3ae9b96</guid>
      <title>How Do You Manage Risk Amidst a Rapidly Growing Third-Party Ecosystem?</title>
      <description><![CDATA[<p>A poll from a previous webcast showed 67% of participants were challenged by staff resources and capacity when implementing a third-party risk management (TPRM) program.</p><p>The truth is, there’s no shortage of cyber risks, and managing the volume can be overwhelming for any cybersecurity team. The average enterprise has 6,000 third parties– how do you effectively identify, categorize, and prioritize your most critical risks? Where should you start, and how do compliance requirements factor into the equation? We’ll be debating these questions and more in this episode of Cyber Risk Nation.</p>
]]></description>
      <pubDate>Mon, 15 May 2023 18:58:16 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Peter Finter, Lane Sullivan, Tim Cleary)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/how-do-you-manage-risk-amidst-a-rapidly-growing-third-party-ecosystem-shpKuzA8</link>
      <content:encoded><![CDATA[<p>A poll from a previous webcast showed 67% of participants were challenged by staff resources and capacity when implementing a third-party risk management (TPRM) program.</p><p>The truth is, there’s no shortage of cyber risks, and managing the volume can be overwhelming for any cybersecurity team. The average enterprise has 6,000 third parties– how do you effectively identify, categorize, and prioritize your most critical risks? Where should you start, and how do compliance requirements factor into the equation? We’ll be debating these questions and more in this episode of Cyber Risk Nation.</p>
]]></content:encoded>
      <enclosure length="29586631" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/a4c987ab-b855-4a35-8720-dc69e459c26a/audio/c914d5d3-40cc-4521-88e8-15a37fc6356d/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>How Do You Manage Risk Amidst a Rapidly Growing Third-Party Ecosystem?</itunes:title>
      <itunes:author>Peter Finter, Lane Sullivan, Tim Cleary</itunes:author>
      <itunes:duration>00:30:49</itunes:duration>
      <itunes:summary>Join the discussion on the challenges of managing third-party risks as organizations adopt more third-party solutions– and what they’ve done to overcome them with our speakers - Lane Sullivan SVP, Chief Information Security Officer at Magellan Health, Tim Cleary, Head of Security Risk and Counsel, Bridgewater Associates, LP, and CyberGRX CMO Peter Finter.</itunes:summary>
      <itunes:subtitle>Join the discussion on the challenges of managing third-party risks as organizations adopt more third-party solutions– and what they’ve done to overcome them with our speakers - Lane Sullivan SVP, Chief Information Security Officer at Magellan Health, Tim Cleary, Head of Security Risk and Counsel, Bridgewater Associates, LP, and CyberGRX CMO Peter Finter.</itunes:subtitle>
      <itunes:keywords>third-party cyber risk management, cybersecurity, third party risk, vendor, tprm</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">19a24f1e-894e-42eb-8438-c52d6c203929</guid>
      <title>Vendor Social Engineering Gaps &amp; the Risks They Pose</title>
      <description><![CDATA[<p>Employees are the first line of defense for every company, yet CyberGRX data revealed that while 83% of third parties report they are conducting security awareness training, 42% aren’t testing the effectiveness of it. </p><p>Join Erich Kron, Security Awareness Advocate at KnowBe4 & CyberGRX CISO Dave Stapleton as they discuss the threats posed by third-party testing gaps and the steps you can take to protect your organization.</p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 16:04:44 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Peter Finter, Dave Stapleton, Erich Kron)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/vendor-social-engineering-gaps-and-the-risks-they-pose-mAm6LjAr</link>
      <content:encoded><![CDATA[<p>Employees are the first line of defense for every company, yet CyberGRX data revealed that while 83% of third parties report they are conducting security awareness training, 42% aren’t testing the effectiveness of it. </p><p>Join Erich Kron, Security Awareness Advocate at KnowBe4 & CyberGRX CISO Dave Stapleton as they discuss the threats posed by third-party testing gaps and the steps you can take to protect your organization.</p>
]]></content:encoded>
      <enclosure length="29855797" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/bc7faf89-ccff-43ec-ac42-77851086c132/audio/1b6305ae-5c6e-4838-b3e5-7b8c3f497057/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>Vendor Social Engineering Gaps &amp; the Risks They Pose</itunes:title>
      <itunes:author>Peter Finter, Dave Stapleton, Erich Kron</itunes:author>
      <itunes:duration>00:31:05</itunes:duration>
      <itunes:summary>Join Dave Stapleton, CISO at CyberGRX, &amp; Erich Kron, Security Awareness Advocate at KnowBe4, as they discuss the threats posed by third-party testing gaps and the steps you can take to protect your organization.</itunes:summary>
      <itunes:subtitle>Join Dave Stapleton, CISO at CyberGRX, &amp; Erich Kron, Security Awareness Advocate at KnowBe4, as they discuss the threats posed by third-party testing gaps and the steps you can take to protect your organization.</itunes:subtitle>
      <itunes:keywords>social engineering, third-party cyber risk management, cybersecurity, third party risk, vendor</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">74962f5f-0ff3-484b-ad84-285999321d01</guid>
      <title>Third-Party Cyber Risk Management for Dummies: Chapter 4 - Evolving TPCRM With a Data-Driven Approach</title>
      <description><![CDATA[<p>Join CyberGRX CEO Fred Kneip and Richard Seiersen, Chief Risk Officer for Resilience as they conclude this 4-part webinar series covering all chapters from the recently released guide, Third-Party Cyber Risk Management for Dummies. </p><p>In this adaption of Chapter 4 from this definitive guide, you'll hear from leading experts in the field as they discuss things like:</p><ul><li>How does an Exchange and one-to-many sharing model benefit both customers and their third parties</li><li>Is it possible to gain complete vendor ecosystem visibility</li><li>What role does the MITRE ATT&CK framework play in managing third-party cyber risk?</li><li>Are predictive analytics capabilities the future of third-party cyber risk management</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 16:04:29 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Fred Kneip, Peter Finter, Richard Seiersen)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/tpcrm-for-dummies-ch4-v0NzCcbs</link>
      <content:encoded><![CDATA[<p>Join CyberGRX CEO Fred Kneip and Richard Seiersen, Chief Risk Officer for Resilience as they conclude this 4-part webinar series covering all chapters from the recently released guide, Third-Party Cyber Risk Management for Dummies. </p><p>In this adaption of Chapter 4 from this definitive guide, you'll hear from leading experts in the field as they discuss things like:</p><ul><li>How does an Exchange and one-to-many sharing model benefit both customers and their third parties</li><li>Is it possible to gain complete vendor ecosystem visibility</li><li>What role does the MITRE ATT&CK framework play in managing third-party cyber risk?</li><li>Are predictive analytics capabilities the future of third-party cyber risk management</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></content:encoded>
      <enclosure length="53448339" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/fcc97d70-8566-44fe-b4f5-617dcb1365c7/audio/9a0236f0-e538-4d1d-a415-12a2a7d2b9fe/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>Third-Party Cyber Risk Management for Dummies: Chapter 4 - Evolving TPCRM With a Data-Driven Approach</itunes:title>
      <itunes:author>Fred Kneip, Peter Finter, Richard Seiersen</itunes:author>
      <itunes:duration>00:55:40</itunes:duration>
      <itunes:summary>Join us as we finish the final episode of our 4 part webinar series with a look into Chapter 4: Evolving TPCRM with a data-driven approach</itunes:summary>
      <itunes:subtitle>Join us as we finish the final episode of our 4 part webinar series with a look into Chapter 4: Evolving TPCRM with a data-driven approach</itunes:subtitle>
      <itunes:keywords>tpcrm, third-party cyber risk management, cybersecurity, third party risk, third-party cyber risk management for dummies</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a73417f2-1c27-44f4-8ed2-33fca96bfac8</guid>
      <title>Third-Party Cyber Risk Management for Dummies: Chapter 3 - Tackling the Traditional Approach to TPCRM</title>
      <description><![CDATA[<p>The TPCRM revolution continues with the third in our 4-part webinar series with a focus on Chapter 3: Tackling the Traditional (and Outdated) Approach to TPCRM.</p><p>Join CyberGRX CEO Fred Kneip and Andy Kirkland, CISO of Starbucks as they continue this 4-part webinar series covering all chapters from the recently released guide, Third-Party Cyber Risk Management For Dummies.</p><p><strong>In this adaptation of Chapter 3 from this definitive guide, you’ll hear from leading experts in the field as they discuss things like:</strong></p><ul><li>Is the current approach to third-party cyber risk management broken?</li><li>Are assessments effective in accomplishing the desired goal of managing risk effectively?</li><li>How can teams better access and analyze third-party cyber risk data at scale so that they can act quickly and effectively to reduce their risk?</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 16:04:14 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Fred Kneip, Peter Finter, Andy Kirkland)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/tpcrm-for-dummies-ch3-EUF0m8ye</link>
      <content:encoded><![CDATA[<p>The TPCRM revolution continues with the third in our 4-part webinar series with a focus on Chapter 3: Tackling the Traditional (and Outdated) Approach to TPCRM.</p><p>Join CyberGRX CEO Fred Kneip and Andy Kirkland, CISO of Starbucks as they continue this 4-part webinar series covering all chapters from the recently released guide, Third-Party Cyber Risk Management For Dummies.</p><p><strong>In this adaptation of Chapter 3 from this definitive guide, you’ll hear from leading experts in the field as they discuss things like:</strong></p><ul><li>Is the current approach to third-party cyber risk management broken?</li><li>Are assessments effective in accomplishing the desired goal of managing risk effectively?</li><li>How can teams better access and analyze third-party cyber risk data at scale so that they can act quickly and effectively to reduce their risk?</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></content:encoded>
      <enclosure length="58053831" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/c8d13ff5-f6b7-44da-ab94-86575b8037d0/audio/ef2d617b-fcb7-475b-a5d9-813bb5790b4c/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>Third-Party Cyber Risk Management for Dummies: Chapter 3 - Tackling the Traditional Approach to TPCRM</itunes:title>
      <itunes:author>Fred Kneip, Peter Finter, Andy Kirkland</itunes:author>
      <itunes:duration>01:00:28</itunes:duration>
      <itunes:summary>Tune in for the 3rd of our 4 part webinar series with a deep dive into Chapter 3: Tackling the Traditional (and Outdated) Approach to TPCRM </itunes:summary>
      <itunes:subtitle>Tune in for the 3rd of our 4 part webinar series with a deep dive into Chapter 3: Tackling the Traditional (and Outdated) Approach to TPCRM </itunes:subtitle>
      <itunes:keywords>tpcrm, third-party cyber risk management, cybersecurity, third party risk, third-party cyber risk management for dummies</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ef5798df-c6d0-44e4-84be-df1cf66a6323</guid>
      <title>Third-Party Cyber Risk Management for Dummies: Chapter 2 - Communicating the Importance of TPCRM</title>
      <description><![CDATA[<p>When it comes to moving a business forward, the time inevitably comes when you need to implement new tools and processes to get things accomplished, and sometimes it takes a little convincing to get others on board with the direction you want to move in.</p><p>From the CEO and CISO to the board of directors and other stakeholder departments, it’s imperative that you know how to communicate the benefits of having a third-party cyber risk management (TPCRM) strategy in the languages each unique stakeholder speaks.</p><p><strong>In this adaptation of Chapter 2,  join CyberGRX CEO Fred Kneip and Chris McFarland, VP & CISO at Abercrombie & Fitch Co. as they discuss things like:</strong></p><ul><li>How to have important conversations about the need for a comprehensive third-party cyber risk management strategy.</li><li>What are some of the risks associated with maintaining the status quo?</li><li>Steps to take to ensure you have buy-in from the very first conversations through to the implementation and maintenance of the TPCRM solution.</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 16:04:02 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Fred Kneip, Peter Finter, Chris McFarland)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/tpcrm-for-dummies-ch2-juhz3jwH</link>
      <content:encoded><![CDATA[<p>When it comes to moving a business forward, the time inevitably comes when you need to implement new tools and processes to get things accomplished, and sometimes it takes a little convincing to get others on board with the direction you want to move in.</p><p>From the CEO and CISO to the board of directors and other stakeholder departments, it’s imperative that you know how to communicate the benefits of having a third-party cyber risk management (TPCRM) strategy in the languages each unique stakeholder speaks.</p><p><strong>In this adaptation of Chapter 2,  join CyberGRX CEO Fred Kneip and Chris McFarland, VP & CISO at Abercrombie & Fitch Co. as they discuss things like:</strong></p><ul><li>How to have important conversations about the need for a comprehensive third-party cyber risk management strategy.</li><li>What are some of the risks associated with maintaining the status quo?</li><li>Steps to take to ensure you have buy-in from the very first conversations through to the implementation and maintenance of the TPCRM solution.</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a href="https://info.cybergrx.com/tpcrm-for-dummies">here.</a></p>
]]></content:encoded>
      <enclosure length="53504356" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/5171a1b5-28a8-4c83-be94-c0d9329e0db9/audio/1b6bf2c4-6aa0-4716-9137-a53be59f1600/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>Third-Party Cyber Risk Management for Dummies: Chapter 2 - Communicating the Importance of TPCRM</itunes:title>
      <itunes:author>Fred Kneip, Peter Finter, Chris McFarland</itunes:author>
      <itunes:duration>00:55:43</itunes:duration>
      <itunes:summary>Get ready for the second event in this 4 webinar series with a deep dive into Chapter 2: Communicating the Importance of TPCRM</itunes:summary>
      <itunes:subtitle>Get ready for the second event in this 4 webinar series with a deep dive into Chapter 2: Communicating the Importance of TPCRM</itunes:subtitle>
      <itunes:keywords>tpcrm, third-party cyber risk management, cybersecurity, third party risk, third-party cyber risk management for dummies</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">107118da-0323-4758-8f5c-8e83636e4e34</guid>
      <title>Third-Party Cyber Risk Management for Dummies: Chapter 1 - Understanding Third-Party Cyber Risk Management</title>
      <description><![CDATA[<p>Join CyberGRX CEO Fred Kneip and Dave Estlick, CISO at Chipotle Mexican Grill as they kick off this 4 webinar series covering all chapters from the recently released guide, <i>Third-Party Cyber Risk Management For Dummies.</i></p><p>In this adaptation of Chapter 1 from this definitive guide, you’ll hear from leading experts in the field as they discuss things like:</p><ul><li>Are all third-party cyber risk management solutions and methodologies created equal?</li><li>Is one more appropriate for a specific industry than another?</li><li>How do you ensure all stakeholder departments (and the organization as a whole), play an active role in defending against cyber threats?</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a>here.</a></p>
]]></description>
      <pubDate>Fri, 24 Feb 2023 16:03:49 +0000</pubDate>
      <author>jessica.jenks@cybergrx.com (Fred Kneip, Dave Estlick, Peter Finter)</author>
      <link>https://cyber-risk-nation.simplecast.com/episodes/tpcrm-for-dummies-ch1-8_DprjrZ</link>
      <content:encoded><![CDATA[<p>Join CyberGRX CEO Fred Kneip and Dave Estlick, CISO at Chipotle Mexican Grill as they kick off this 4 webinar series covering all chapters from the recently released guide, <i>Third-Party Cyber Risk Management For Dummies.</i></p><p>In this adaptation of Chapter 1 from this definitive guide, you’ll hear from leading experts in the field as they discuss things like:</p><ul><li>Are all third-party cyber risk management solutions and methodologies created equal?</li><li>Is one more appropriate for a specific industry than another?</li><li>How do you ensure all stakeholder departments (and the organization as a whole), play an active role in defending against cyber threats?</li></ul><p>Download a free copy of the guide, <i>Third-Party Cyber Risk Management For Dummies, </i><a>here.</a></p>
]]></content:encoded>
      <enclosure length="55653502" type="audio/mpeg" url="https://cdn.simplecast.com/audio/7004f80e-25db-452c-a1a1-c0bc948a3129/episodes/3d7118a0-e3f6-4835-ba02-d62577199e1a/audio/a2d1be67-17b7-47c9-9d33-f262f6a5256b/default_tc.mp3?aid=rss_feed&amp;feed=5_6DftIv"/>
      <itunes:title>Third-Party Cyber Risk Management for Dummies: Chapter 1 - Understanding Third-Party Cyber Risk Management</itunes:title>
      <itunes:author>Fred Kneip, Dave Estlick, Peter Finter</itunes:author>
      <itunes:duration>00:57:58</itunes:duration>
      <itunes:summary>Sit back and relax as we kick off this 4 webinar series with a deep dive into Chapter 1: Understanding Third-Party Cyber Risk Management (TPCRM)</itunes:summary>
      <itunes:subtitle>Sit back and relax as we kick off this 4 webinar series with a deep dive into Chapter 1: Understanding Third-Party Cyber Risk Management (TPCRM)</itunes:subtitle>
      <itunes:keywords>tpcrm, third-party cyber risk management, cybersecurity, third party risk, third-party cyber risk management for dummies</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>