{"id":42986,"date":"2024-05-29T05:52:32","date_gmt":"2024-05-29T12:52:32","guid":{"rendered":"https:\/\/www.syteca.com\/?post_type=resources&#038;p=42986"},"modified":"2024-05-30T00:03:10","modified_gmt":"2024-05-30T07:03:10","slug":"webinar-on-effective-third-party-vendor-monitoring-strategies","status":"publish","type":"resources","link":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies","title":{"rendered":"Webinar on Effective Third-Party Vendor Monitoring Strategies"},"content":{"rendered":"\n\t\t<div  class=\"block-4e9c6b16-1f04-4e93-8fda-5a959b89eee0 areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 250, 254,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-55964205-c482-48bc-a37f-829bdd2155fd areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-56e8af5f-6b24-4e78-9d61-5305f18972ea row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div id=\"breadcrumbs\" class=\"block-b514dd46-7047-46a4-89f2-34f10db3d577 col areoi-element resource-breadcrumbs col-sm-12\">\n\t\t\t\n\t\t\t\n<div class=\"yoast-breadcrumbs\"><span><span><a href=\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\">Resources<\/a><\/span> &gt; <span><a href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\">Webinar<\/a><\/span> &gt; <span class=\"breadcrumb_last\" aria-current=\"page\">Webinar on Effective Third-Party Vendor Monitoring Strategies<\/span><\/span><\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-c63f40d7-581f-4c7c-bb00-b02a745a4911 col areoi-element col-12 col-lg-6 col-xl-6\">\n\t\t\t\n\t\t\t\n\n<p class=\"p-poppins text-center text-lg-start has-text-color\" style=\"color:#4790ea;font-size:17px;font-style:normal;font-weight:600\">On-demand Webinar<\/p>\n\n\n\n<h1 class=\"wp-block-heading text-center text-lg-start\">Effective Third-Party Vendor Monitoring Strategies<\/h1>\n\n\n\n<p class=\"p-poppins py-2 text-18-15\">Watch our webinar with Jonathan Care, recognized cybersecurity expert and former Gartner analyst.<\/p>\n\n\n\n<p><strong>Gain valuable insights on the following topics:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identifying and mitigating cybersecurity risks posed by third-party vendor activities<\/li>\n\n\n\n<li>Key regulations affecting third-party vendor management, such as GDPR, HIPAA, or NIST.<\/li>\n\n\n\n<li>Developing and improving your vendor compliance program.<\/li>\n\n\n\n<li>The role of technology in streamlining effective insider risk management programs.<\/li>\n\n\n\n<li>Essential strategies and tools for vendor monitoring and user management.<\/li>\n\n\n\n<li>Real-life case studies on third-party vendor monitoring.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group block-share-social-buttons align-items-lg-start is-vertical is-content-justification-center is-layout-flex wp-container-core-group-is-layout-4b2eccd6 wp-block-group-is-layout-flex\">\n<p class=\"p-poppins mb-2\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Share:<\/p>\n\n\n\n<ul class=\"wp-block-social-links has-icon-color has-icon-background-color ms-2 ms-lg-0 is-layout-flex wp-block-social-links-is-layout-flex\"><li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-linkedin  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&amp;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;title= noopener nofollow\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fwebinar-on-effective-third-party-vendor-monitoring-strategies&#038;title=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M19.7,3H4.3C3.582,3,3,3.582,3,4.3v15.4C3,20.418,3.582,21,4.3,21h15.4c0.718,0,1.3-0.582,1.3-1.3V4.3 C21,3.582,20.418,3,19.7,3z M8.339,18.338H5.667v-8.59h2.672V18.338z M7.004,8.574c-0.857,0-1.549-0.694-1.549-1.548 c0-0.855,0.691-1.548,1.549-1.548c0.854,0,1.547,0.694,1.547,1.548C8.551,7.881,7.858,8.574,7.004,8.574z M18.339,18.338h-2.669 v-4.177c0-0.996-0.017-2.278-1.387-2.278c-1.389,0-1.601,1.086-1.601,2.206v4.249h-2.667v-8.59h2.559v1.174h0.037 c0.356-0.675,1.227-1.387,2.526-1.387c2.703,0,3.203,1.779,3.203,4.092V18.338z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">LinkedIn<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-facebook  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F noopener nofollow\" target=\"_blank\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fwebinar-on-effective-third-party-vendor-monitoring-strategies\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M12 2C6.5 2 2 6.5 2 12c0 5 3.7 9.1 8.4 9.9v-7H7.9V12h2.5V9.8c0-2.5 1.5-3.9 3.8-3.9 1.1 0 2.2.2 2.2.2v2.5h-1.3c-1.2 0-1.6.8-1.6 1.6V12h2.8l-.4 2.9h-2.3v7C18.3 21.1 22 17 22 12c0-5.5-4.5-10-10-10z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Facebook<\/span><\/a><\/li>\n\n<li style=\"color:#ffffff;background-color:#3962e3;\" class=\"wp-social-link wp-social-link-twitter  mx-2 mx-lg-0 wp-block-social-link\"><a rel=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwhite-papers%2Fhow-to-manage-insider-risks-in-banking-and-finance%2F&amp;text= noopener nofollow\" target=\"_blank\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.syteca.com%2Fen%2Fresources%2Fwebinars%2Fwebinar-on-effective-third-party-vendor-monitoring-strategies&#038;text=\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M22.23,5.924c-0.736,0.326-1.527,0.547-2.357,0.646c0.847-0.508,1.498-1.312,1.804-2.27 c-0.793,0.47-1.671,0.812-2.606,0.996C18.324,4.498,17.257,4,16.077,4c-2.266,0-4.103,1.837-4.103,4.103 c0,0.322,0.036,0.635,0.106,0.935C8.67,8.867,5.647,7.234,3.623,4.751C3.27,5.357,3.067,6.062,3.067,6.814 c0,1.424,0.724,2.679,1.825,3.415c-0.673-0.021-1.305-0.206-1.859-0.513c0,0.017,0,0.034,0,0.052c0,1.988,1.414,3.647,3.292,4.023 c-0.344,0.094-0.707,0.144-1.081,0.144c-0.264,0-0.521-0.026-0.772-0.074c0.522,1.63,2.038,2.816,3.833,2.85 c-1.404,1.1-3.174,1.756-5.096,1.756c-0.331,0-0.658-0.019-0.979-0.057c1.816,1.164,3.973,1.843,6.29,1.843 c7.547,0,11.675-6.252,11.675-11.675c0-0.178-0.004-0.355-0.012-0.531C20.985,7.47,21.68,6.747,22.23,5.924z\"><\/path><\/svg><span class=\"wp-block-social-link-label screen-reader-text\">Twitter<\/span><\/a><\/li><\/ul>\n<\/div>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div style=\"--bs-bg-opacity:0\"  class=\"block-23908a0e-8976-4292-b0cb-78c14770eb79 col areoi-element block-white-papers-form col-12 col-lg-6   bg-body\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(71, 144, 234,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n\t\t<div  class=\"block-f504a026-f7ed-4d90-ae80-63c7ae04e5f2 areoi-element hs-white-pares-form pb-3\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(255, 255, 255,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\n<script>\n  hbspt.forms.create({\n    region: \"na1\",\n    portalId: \"612026\",\n    formId: \"95493147-cf6c-4559-803b-1895fadc6a2d\",\n    onFormSubmitted: function($form) {\n      $('.wp-embed-aspect-16-9').css(\"display\", \"block\");\n\t\t\t}\n  });\n<\/script>\n\n\n\n\t\t<div  class=\"block-6bc7c832-c5dd-4506-9c25-31e7df4d1503 areoi-element div-round\">\n\t\t\t\n\t\t\t\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\" style=\"display:none\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ratio ratio-16x9\"><iframe title=\"Syteca&#039;s Webinar - Effective Third-Party Vendor Monitoring Strategies\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/swaSsTHVrMY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-e3cc8aa8-93f6-4f47-b69b-3d8d9571f902 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-c58b81a5-0144-4240-96b7-f2325c19ea47 row areoi-element\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-97b9ddc0-084f-41bc-bf26-c3dd49a067c8 col areoi-element col-12 col-lg-5\">\n\t\t\t\n\t\t\t\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"641\" height=\"637\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29025138\/JC-photo.png\" alt=\"\" class=\"wp-image-42987\" style=\"object-fit:cover;width:350px;height:350px\" srcset=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29025138\/JC-photo.png 641w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29025138\/JC-photo-300x298.png 300w, https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29025138\/JC-photo-150x150.png 150w\" sizes=\"(max-width: 641px) 100vw, 641px\" \/><\/figure>\n<\/div>\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-a6578ce9-8a5d-4bbb-8726-d7c9bf5ddde4 col areoi-element block-description-bg col-12 col-lg-7 order-1 order-lg-0\">\n\t\t\t\n\t\t\t\n\n<p><\/p>\n\n\n\n<h2  class=\"wp-block-heading\"><mark style=\"background-color:rgba(0, 0, 0, 0);color:#548ff9\" class=\"has-inline-color\">About the speaker<\/mark><\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Jonathan Care<\/strong><\/p>\n\n\n\n<p><em>Cybersecurity Expert, Former Gartner Analyst<\/em><\/p>\n\n\n\n<p>Jonathan Care is an expert in the field of cybersecurity and fraud detection. Care previously worked at Gartner, where he oversaw insider threat and risk research and identified key players in the fraud detection and prevention market. <\/p>\n\n\n\n<p>Jonathan Care regularly advises cybersecurity industry leaders on strategic growth and contributes to Dark Reading, an online cybersecurity news and information platform. Care also has experience testifying in court as an expert witness and forensic investigator.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t","protected":false},"featured_media":43021,"menu_order":0,"template":"","class_list":["post-42986","resources","type-resources","status-publish","has-post-thumbnail","hentry","resource_category-webinars"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca<\/title>\n<meta name=\"description\" content=\"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca\" \/>\n<meta property=\"og:description\" content=\"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T07:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29060133\/OG-Webinar-Third-Party-Vendor-Monitoring-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies\",\"url\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies\",\"name\":\"Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png\",\"datePublished\":\"2024-05-29T12:52:32+00:00\",\"dateModified\":\"2024-05-30T07:03:10+00:00\",\"description\":\"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png\",\"width\":416,\"height\":216,\"caption\":\"Effective Third-Party Vendor Monitoring Strategies\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Resources\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/%resource_category%\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Webinar\",\"item\":\"https:\/\/www.syteca.com\/en\/resources\/webinars\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Webinar on Effective Third-Party Vendor Monitoring Strategies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca","description":"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies","og_locale":"en_US","og_type":"article","og_title":"Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca","og_description":"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.","og_url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies","og_site_name":"Syteca","article_modified_time":"2024-05-30T07:03:10+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29060133\/OG-Webinar-Third-Party-Vendor-Monitoring-1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies","url":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies","name":"Webinar on Effective Third-Party Vendor Monitoring Strategies | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png","datePublished":"2024-05-29T12:52:32+00:00","dateModified":"2024-05-30T07:03:10+00:00","description":"Watch our webinar with Jonathan Care, an established cybersecurity expert and former Gartner analyst, who unveils powerful strategies for optimizing third-party vendor monitoring.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/29055854\/cover-Webinar-Third-Party-Vendor-Monitoring.png","width":416,"height":216,"caption":"Effective Third-Party Vendor Monitoring Strategies"},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/resources\/webinars\/webinar-on-effective-third-party-vendor-monitoring-strategies#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Resources","item":"https:\/\/www.syteca.com\/en\/resources\/%resource_category%"},{"@type":"ListItem","position":2,"name":"Webinar","item":"https:\/\/www.syteca.com\/en\/resources\/webinars"},{"@type":"ListItem","position":3,"name":"Webinar on Effective Third-Party Vendor Monitoring Strategies"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources\/42986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/resources"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/resources"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/43021"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=42986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}