New Strategies for Operational Resilience & Supplier Risk Management

Joel Brandon, Sales Director, EMEA, ProcessUnity

In the UK, rapid technological advancements, changing consumer behaviors, and increasing cybersecurity concerns have led regulators to consider new strategies to address economic stability through outsourcing and third parties. As a result, operational resilience has become a leading focus for the UK Prudential Regulation Authority (PRA).  How prepared are you for the Prudential Regulatory Authority’s (PRA) new guidelines on outsourcing and third-party risk management? The PRA’s revised requirements that go into effect later this month set new standards for outsourcing arrangements, including how to assess materiality, rules around concentration risk and new expectations around compliance.

Join ProcessUnity for a session on the proposed changes and tips on how to approach the changing regulatory landscape.

Attendees will learn:

– How outsourcing will change once the guidelines are enacted
– Best practices to develop an appropriate methodology for assessing materiality
– Guidance to help you understand outsourcing risks and the steps needed to minimize them
– Insight on implementing a robust contingency plan to ensure compliance and protect operational resiliency

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

The Best Technology Against Fraud
Cybersecurity has always been a very serious concern not just for businesses but also for personal security. 2022 has seen a rapid increase in both businesses and people stepping up their security towards more secure channels and technological advancements – and it is set to get even more widespread throughout the year. The global pandemic...
Combatting Critical Infrastructure’s Security Flaws
The latest threat security research into operational technology and industrial systems has identified around 56 issues that cyber criminals could instigate cyberattacks against critical infrastructure. Unfixable The problem is not just in the number, but also in the fact that many of them are classed as unfixable. This is more due to insecure protocols and...
The Best Practices for Enterprise Security
As more and more internet users become increasingly aware of, frustrated and dissatisfied with how organizations are failing to secure their personal information, we take a look at what the best practices are for enterprise security within organizations should be at this point. What is Enterprise Security When we talk of enterprise security, we are...