Third-Party Cyber Vulnerabilities and How to Stop Them
March 2026
Third-party vendors are now one of the biggest sources of cyber risk. This session will show you how attackers exploit trusted connections, what insurers and regulators expect, and practical steps to assess and manage vendor vulnerabilities before they impact your business.
What you’ll learn:Â
- How attackers exploit trusted vendor connections and shared platforms Â
- Practical steps for evaluating vendor cybersecurity posture and enforcing safeguardsÂ
- What insurers and regulators expect in third-party risk management and documentationÂ
Webinar presented by:
Amos Aesoph
CISO
XigentÂ
Looking for the webinar recording and slides?
Contact your North Risk Partners advisor. Don’t have an advisor? We’ll help you find one.
Careers