Achieving Cyber Resilience
with a Mature Third Party Security & Risk Management Program

November 18th 2021
at 17:00
CET
1
hour
ABOUT webinar
Agility and Resiliency in your TPRM Program

Optimal management of third party risk
in the OT environment

Verifiable audit: what are the advantages?

Considering the inherent risk of each relationship

Key pillars of effective third parties assessment & monitoring

Is automation a solution?


It's not the news, that a cyber-attack for each organization these days is just a matter of time. Thus, the game-changer is not IF you got attacked, but HOW quickly you can recover and get back on track with minimum financial and reputational loss.

2021 cyber-attacks statistics clearly show that the main target is a supply chain, making it crucial to have a mature third party security & risk management program in place and work together with your suppliers towards mutual cyber resilience.

Join us at the webinar to get the new era practices and tools on effective third parties assessment and monitoring.

TOPICS
to be discussed
OUR
speakers
Principal at Rosemont Strategies, LLC
Jeffrey Batt
- Cyber insurance executive, former AmTrust, M&T Bank, Marsh
- Associate Deputy General Counsel at the U.S. Department of Defense from 2010-2016

The presentation will cover:

  • Emphasis on supply chain and distribution/logistics
  • Optimal management of third-party risk in the OT environment
  • Assessment of pros / cons of external vulnerability scanning, and the advantages of using a verifiable audit vs. "check a box" assessment
CISO at SUSE
Petr Špiřík
Cyber security executive with strategic vision and cross-disciplinary expertise. Leading the global organizations through change - building, transforming and managing their enterprise security, with the executive level stakeholders.

Key areas of interest:

• Integration of the Threat Intelligence, Incident Response & Vulnerability Management into the unified Threat Management.

• Cyber Security Architecture & Operations. Building a scalable and sustainable global security program, adaptive to the changing threat landscape and business objectives.

• Privacy & Data Protection. Design and operate the cyber security program with a special focus on data protection in all its aspects, applying the Privacy by Design principles.

• Education & growth of a new generation of cyber security professionals. There is no better way how to bridge the industry skill gap.


Moderator
Head of Third Party Risk Program & Strategy at Guardian Life
Rick Merhai
Rick is an Accomplished IT Security Leader With Proven Expertise and the Ability to Execute Large Scale Global Strategic Initiatives in Cyber Security, Enterprise Risk Management, Information Security, Vendor Management, Third Party Risk Management and Risk Assessments.

Agility and Resiliency in your TPRM Program

• Why is managing Third Party Risk Important?
• 4 Forces Shaping the New Normal
• Key considerations when enhancing your third-party risk management program
• Validation and continuous monitoring


CISO at IG&H
Pedro Cunha
Brought onboard of the Information Security World in mid-2001, started his path by transposing and adopting the "recently published" best practices of BS 17799:2000 into normal daily operations. With past experience in Banking, Insurance, Telecom and Consultancy markets, managed to bring up a Global banking Portuguese subsidiary to be a consistent TOP3 performer on a 3 year Global Security program. Furthermore, his team was able to achieve both ISO27001 and ISO27701 certifications within a period of 6 months.

Supply Chain Management - How deep is deep enough? A resilient approach on Supply Chain Management

• Supply chain and vendor management - What am I missing?
• Contractual clauses: Consider both normal ops and contingency
• Cross-dependencies: My disruptive event also impact my third party
• Setup your core: Main business critical functions and its dependencies

Follow Third Party & Supply Chain Cyber Security Summit on social media to stay tuned!
Register For Free
For General Questions
+420 234 280 783
webinars@giavirtual.com
Industry
Country
By submitting the form you agree to the Registration Terms & Conditions. The submitted information will be processed according to the GIA Global Group's Privacy Policy.
Join us live
At GIA Global Group we believe that deep personal connections are the key to driving your business & professional growth successfully and we invite you to check our annual live events to maximise your experience with us.
9-11 March 2022
Amsterdam, The Netherlands

Third Party & Supply Chain Cyber Security Summit
Learn the latest case studies on the end to end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the 6th Annual Third Party & Supply Chain Cyber Security Summit.

  • How much of your data security is really under your control?
  • What is your risk management approach towards your suppliers?
  • How to secure your network and protect your sensitive data?

Led by the TOP information security professionals from leading companies the discussion will give you an opportunity to see the issue from the perspective of different industries & angles and identify the complex solution to be implemented.