Limited Time Sale$21.59 cheaper than the new price!!
| Management number | 220491422 | Release Date | 2026/05/03 | List Price | $14.40 | Model Number | 220491422 | ||
|---|---|---|---|---|---|---|---|---|---|
| Category | |||||||||
Integrate cybersecurity into TPRM to reduce vendor breach impact, meet DORA and NIST C-SCRM expectations, and monitor fourth-party exposure using SBOM-driven diligence, threat intelligence, and automation.Key FeaturesDesign TPRM lifecycle linking vendor risk to cyber -outcomesMap NIST, ISO 27036, DORA, GDPR to audit-ready controlsEnforce contracts, SLAs, due diligence across 3rd/4th partiesImplement continuous monitoring beyond questionnaires-Develop breach response playbooks with SBOMBook DescriptionModern organizations rely on complex vendor ecosystems, but third-party risk management (TPRM) and cybersecurity often operate in silos. This book shows how to connect vendor risk management with supply chain cybersecurity using a practical, lifecycle-driven approach.You’ll design a program covering onboarding, vendor risk assessment, continuous monitoring, and offboarding. Instead of static questionnaires, you’ll use threat intelligence, security ratings, and real-world signals to strengthen third-party security and improve decisions across procurement, legal, and security teams.The book aligns practices with NIST supply chain risk management (C-SCRM), ISO 27036, DORA compliance, and GDPR, translating them into audit-ready controls and governance.You’ll learn how to embed vendor due diligence into contracts, manage fourth-party risk, and extend security requirements across suppliers. It also covers SBOM (Software Bill of Materials) standards such as SPDX and CycloneDX to improve software supply chain transparency.Finally, you’ll develop vendor breach response playbooks and apply automation and AI-driven risk scoring to scale your program. By the end, you can build a resilient, intelligence-led TPRM capability.What you will learnBuild a TPRM lifecycle for supply chain cybersecurityPerform vendor risk assessment and tieringAlign with NIST C-SCRM, ISO 27036, and DORAEmbed vendor due diligence into contracts and SLAsIdentify and manage fourth-party risk exposureApply SBOM (SPDX, CycloneDX) to supplier securityRun vendor breach response for supply chain incidentsUse AI and automation to scale vendor risk managementWho this book is forThis book is for cybersecurity leaders, TPRM/VRM practitioners, risk managers, and procurement professionals who need a repeatable way to evaluate and monitor vendors and critical suppliers. Compliance teams and in-house counsel working with DORA, GDPR, HIPAA, and related requirements will also benefit. Basic familiarity with security principles and vendor management helps.Table of ContentsThe Disconnect — TPRM vs. Cybersecurity in the Supply ChainThe New Attack Surface — A Taxonomy of Supply Chain RisksThe Foundational Framework — A TPRM-Driven Security LifecycleThe Regulatory Blueprint — Navigating Key FrameworksThe Legal Foundation — Embedding Cyber into ContractsThe Unseen Threat — Managing Fourth-Party RiskDeep Dive – threat Intelligence, uncovering hidden risksThe Incident Blueprint — Responding to Thirdand Fourth-Party BreachesMeasuring and advancing TPRM maturityConnecting TPRM and SCM - Due Diligence of Suppliers and understanding threatsUnderstanding your service provider SBOM - Applying first party SBOM D diligence to all service providersThe Technological Imperative — Leveraging AI and AutomationThe Software Ingredient List — SBOM and Software Supply Chain SecurityBuilding an Advanced Program — From Compliance to Resilience Read more
| ISBN13 | 978-1806708109 |
|---|---|
| Edition | 1st |
| Language | English |
| Publisher | Packt Publishing |
| Accessibility | Learn more |
| Publication date | June 9, 2026 |
If you notice any omissions or errors in the product information on this page, please use the correction request form below.
Correction Request Form