{"id":42052,"date":"2024-05-16T00:43:46","date_gmt":"2024-05-16T07:43:46","guid":{"rendered":"https:\/\/www.syteca.com\/?p=42052"},"modified":"2024-05-16T00:51:26","modified_gmt":"2024-05-16T07:51:26","slug":"webinar-on-third-party-vendor-monitoring","status":"publish","type":"post","link":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring","title":{"rendered":"Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care"},"content":{"rendered":"\n<p>Join Syteca for an insightful webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who will unveil powerful strategies for optimizing third-party vendor monitoring.&nbsp;<\/p>\n\n\n\n<p>Attend the webinar to learn about selecting reliable vendors, applying risk assessment frameworks, meeting compliance requirements, and communicating with vendors effectively to mitigate potential threats driven by third parties.<\/p>\n\n\n\n\t\t<div  class=\"block-14686bbd-90fd-4771-b07b-18739c127dc3 areoi-element container template-6 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a119199e-6172-4d31-83b5-05c3440d9700 areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.25rem;font-style:normal;font-weight:600\"><strong>Webinar details<\/strong><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5f30b4b3-f3c9-49b2-ae75-e4e04be544e1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Date<br><strong><strong>May 23, 2024<\/strong><\/strong><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Time<br><strong><strong>10:00 AM (PDT) \/ 7:00 PM (CET)<\/strong><\/strong><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-28b3d633-1691-4973-8d7b-d2c1838773fc row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1765243f-d41b-4e37-8d4d-7c7bde2c1da0 col areoi-element col-12 col-sm-12 col-md-12 col-lg-12 col-xl-12 col-xxl-12\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-none d-sm-none d-md-block\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/events.teams.microsoft.com\/event\/421a934e-bc9c-41a7-87fa-6bcf8b6637f6@95e5b51e-5f5a-428e-bb95-86d8b5f317f1\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Register now<\/strong><\/a><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">About the speaker<\/h2>\n\n\n\n\t\t<div  class=\"block-a5d3eaa9-4184-47b3-a5c5-f47cfe205cf8 areoi-element container template-10 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-b733ffb0-e5bb-4be9-9856-c650e9dfbca2 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element p-4 d-flex align-items-center col-12 col-md-4\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-poppins\" style=\"font-style:normal;font-weight:400\"><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"426\" height=\"424\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16000823\/photo-Jonathan-1.png\" alt=\"\" class=\"wp-image-42063\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16000823\/photo-Jonathan-1.png 426w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16000823\/photo-Jonathan-1-300x300.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16000823\/photo-Jonathan-1-150x150.png 150w\" sizes=\"(max-width: 426px) 100vw, 426px\" \/><\/figure>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element p-4 text-center text-md-start col-12 col-md-8\">\n\t\t\t\n\t\t\t\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/computercrime\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jonathan Care<\/a> is an expert in the field of cybersecurity and fraud detection. Care previously worked at Gartner, where he oversaw insider threat and risk research and identified key players in the fraud detection and prevention market.<\/p>\n\n\n\n<p>Jonathan Care regularly advises cybersecurity industry leaders on strategic growth and contributes to Dark Reading, an online cybersecurity news and information platform. Care also has experience testifying in court as an expert witness and forensic investigator.<\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">What to expect from the webinar<\/h2>\n\n\n\n<p>While third-party vendors are essential for business success, they may also bring cybersecurity risks. The <a href=\"https:\/\/www.ibm.com\/reports\/data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">2023 Cost of a Data Breach Report by IBM Security<\/a> reveals that data breaches involving third-party vendors cost $192,485 more than the average breach.<\/p>\n\n\n\n<p>Cybersecurity risks related to third-party service providers can be split into five main categories:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"314\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16001316\/pic-1-Press-Release-Webinar-with-Jonathan.svg\" alt=\"\" class=\"wp-image-42072\"\/><\/figure>\n\n\n\n<p>During the webinar, Jonathan Care will offer actionable guidance on protecting your business against the risks associated with third-party service providers. During the webinar, you will learn best practices for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Detecting and addressing cybersecurity threats arising from the cooperation with third parties<\/li>\n\n\n\n<li>Complying with requirements regulating third-party vendor management, including <a href=\"\/en\/solutions\/meeting-compliance-requirements\/gdpr-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a>, <a href=\"\/en\/solutions\/meeting-compliance-requirements\/hipaa-compliance-solutions\" target=\"_blank\" rel=\"noreferrer noopener\">HIPAA<\/a>, and <a href=\"https:\/\/www.syteca.com\/en\/solutions\/meeting-compliance-requirements\/nist-compliance\" target=\"_blank\" rel=\"noreferrer noopener\">NIST<\/a><\/li>\n\n\n\n<li>Developing and enhancing your vendor compliance program<\/li>\n\n\n\n<li>Leveraging technological solutions to streamline <a href=\"\/en\/solutions\/insider-risk-management\" target=\"_blank\" rel=\"noreferrer noopener\">insider risk management<\/a> initiatives effectively<\/li>\n<\/ul>\n\n\n\n<p>Care will also present a real-life case study on how Syteca helped an organization manage third-party risks.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">About Syteca<\/h2>\n\n\n\n<p>Syteca is a human-focused insider risk management platform that helps companies prevent and mitigate insider threats, including those stemming from third-party service providers. By deploying Syteca, organizations can detect suspicious third-party activity, respond to cybersecurity incidents, and streamline their compliance efforts.<\/p>\n\n\n\n<p>For effective <a href=\"\/en\/solutions\/third-party-vendor-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">third-party risk mitigation<\/a>, Syteca offers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/en\/product\/supported-platforms\/windows-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\">RDP session monitoring and recording<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\">Privileged access management<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/product\/identity-management\" target=\"_blank\" rel=\"noreferrer noopener\">Identity management<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\">Real-time alerts on suspicious activity<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/product\/reports-and-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">User activity reports<\/a><\/li>\n<\/ul>\n\n\n\n<p>With Syteca, you can get 360-degree visibility into the conduct of third-party vendors within your network and take immediate action when a security threat occurs. World-renowned organizations like Visa, Samsung, Panasonic, and UPS have already entrusted Syteca with their security.<\/p>\n\n\n\n<h2  class=\"wp-block-heading\">Reserve your spot today!<\/h2>\n\n\n\n<p>Don\u2019t miss your chance to learn advanced third-party vendor monitoring strategies and enhance your organization\u2019s cybersecurity. <a href=\"https:\/\/events.teams.microsoft.com\/event\/421a934e-bc9c-41a7-87fa-6bcf8b6637f6@95e5b51e-5f5a-428e-bb95-86d8b5f317f1\" target=\"_blank\" rel=\"noreferrer noopener\">Register for the webinar now<\/a> and join us live on <strong>the 23rd of May<\/strong>.<\/p>\n\n\n\n<p><a href=\"\/en\/blog\" target=\"_blank\" rel=\"noreferrer noopener\">Explore our blog<\/a> for more insights into third-party vendor monitoring and insider risk management.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Join Syteca for an insightful webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who will unveil powerful strategies for optimizing third-party vendor monitoring.&nbsp; Attend the webinar to learn about selecting reliable vendors, applying risk assessment frameworks, meeting compliance requirements, and communicating with vendors effectively to mitigate potential threats driven by third [&hellip;]<\/p>\n","protected":false},"author":45,"featured_media":42087,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"class_list":["post-42052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca<\/title>\n<meta name=\"description\" content=\"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca\" \/>\n<meta property=\"og:description\" content=\"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-16T07:43:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-16T07:51:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ivan Stechynskyi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ivan Stechynskyi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\"},\"author\":{\"name\":\"Ivan Stechynskyi\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd\"},\"headline\":\"Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care\",\"datePublished\":\"2024-05-16T07:43:46+00:00\",\"dateModified\":\"2024-05-16T07:51:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\"},\"wordCount\":459,\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg\",\"articleSection\":[\"Company News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\",\"url\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\",\"name\":\"Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg\",\"datePublished\":\"2024-05-16T07:43:46+00:00\",\"dateModified\":\"2024-05-16T07:51:26+00:00\",\"author\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd\"},\"description\":\"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg\",\"width\":1920,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Company News\",\"item\":\"https:\/\/www.syteca.com\/en\/blog\/category\/company-news\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd\",\"name\":\"Ivan Stechynskyi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111322\/Ivan.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111322\/Ivan.png\",\"caption\":\"Ivan Stechynskyi\"},\"description\":\"Ivan is an accomplished technical writer with focused expertise in information security, insider threat protection, and third-party vendor management. Renowned for his commitment to precision, Ivan's articles are a valuable resource for organizations seeking to bolster their defenses against internal risks and enhance vendor-related security measures. With a deliberate exclusion of external threats from his writings, Ivan uniquely tailors his content to address the intricacies of safeguarding sensitive information within organizational boundaries.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/ivan-stechynskyi-33a335187\/\"],\"url\":\"https:\/\/www.syteca.com\/en\/blog\/author\/ivan-stechynskyi\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca","description":"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring","og_locale":"en_US","og_type":"article","og_title":"Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca","og_description":"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.","og_url":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring","og_site_name":"Syteca","article_published_time":"2024-05-16T07:43:46+00:00","article_modified_time":"2024-05-16T07:51:26+00:00","og_image":[{"width":1920,"height":601,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg","type":"image\/jpeg"}],"author":"Ivan Stechynskyi","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ivan Stechynskyi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#article","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring"},"author":{"name":"Ivan Stechynskyi","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd"},"headline":"Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care","datePublished":"2024-05-16T07:43:46+00:00","dateModified":"2024-05-16T07:51:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring"},"wordCount":459,"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg","articleSection":["Company News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring","url":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring","name":"Webinar on Third-Party Vendor Monitoring with Jonathan Care, Former Gartner Analyst| Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg","datePublished":"2024-05-16T07:43:46+00:00","dateModified":"2024-05-16T07:51:26+00:00","author":{"@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd"},"description":"Join a webinar on effective vendor monitoring hosted by cybersecurity expert, former Gartner analyst, and Dark Reading contributor Jonathan Care.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/16003752\/banner-Press-Release-Webinar-with-Jonathan.jpg","width":1920,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/blog\/webinar-on-third-party-vendor-monitoring#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Company News","item":"https:\/\/www.syteca.com\/en\/blog\/category\/company-news"},{"@type":"ListItem","position":2,"name":"Master Third-Party Vendor Monitoring: Join Our Exclusive Webinar Hosted by Jonathan Care"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/162db1f62235608f2fb22e7bbb646cdd","name":"Ivan Stechynskyi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111322\/Ivan.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111322\/Ivan.png","caption":"Ivan Stechynskyi"},"description":"Ivan is an accomplished technical writer with focused expertise in information security, insider threat protection, and third-party vendor management. Renowned for his commitment to precision, Ivan's articles are a valuable resource for organizations seeking to bolster their defenses against internal risks and enhance vendor-related security measures. With a deliberate exclusion of external threats from his writings, Ivan uniquely tailors his content to address the intricacies of safeguarding sensitive information within organizational boundaries.","sameAs":["https:\/\/www.linkedin.com\/in\/ivan-stechynskyi-33a335187\/"],"url":"https:\/\/www.syteca.com\/en\/blog\/author\/ivan-stechynskyi"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/42052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=42052"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/42052\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/42087"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=42052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/categories?post=42052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/tags?post=42052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}