Thomson Reuters: How to implement an application security program for third-party software.
Recently the FS-ISAC Third-Party Software Security Working Group developed recommended controls for addressing third-party software security including requiring software vendors to submit binary static analysis reports for the software they supply to an organization.
TEAM & DETAILS
VP and Head of IT Security Architecture and Engineering,
Vendor Strategy Manager,
View the Webinar
WHAT YOU WILL LEARN
How Thomson Reuters reduces their overall risk by assessing the security of the applications they purchase.
WHO WILL BENEFIT
Enterprises looking to tackle third-party security and how a peer company has set up their program.