channel company logo

Mitratech Risk & Resilience

TPRM - IT Risk - Cyber Risk - Enterprise Risk - Model Risk

Explore innovative solutions in Enterprise GRC, Third-Party & Vendor Risk Management, and Model Risk Management. This channel delivers thought
leadership on critical topics like TPRM, MRM, EUC management, cyber risk, IT risk, and more, helping organizations navigate the complexities of mode
  • 1,649 Subscribers
  • 28 talks

TPRM - IT Risk - Cyber Risk - Enterprise Risk - Model Risk

Explore innovative solutions in Enterprise GRC, Third-Party & Vendor Risk Management, and Model Risk Management. This channel delivers thought
leadership on critical topics like TPRM, MRM, EUC management, cyber risk, IT risk, and more, helping organizations navigate the complexities of mode
  • 1,649 Subscribers
  • 28 talks

On-demand talks

Mastering Third-Party Risk Management Compliance Requirements in NIS2

Mastering Third-Party Risk Management Compliance Requirements in NIS2

The EU's NIS2 Directive introduces new cyber security requirements to enhance the resilience of critical sectors against growing cyber threats. Join Toro
Solutions and Mitratech risk and compliance experts as they explore the key provisions of NIS2, focusing on risk management, incident reporting, and
third-party risk management. In this webinar, our experts will share: - The key essential requirements of NIS2 and the practical steps your organisation ca…

How to Use NIST Cybersecurity Frameworks to De-Risk Third-Party and Supply Chain Management

How to Use NIST Cybersecurity Frameworks to De-Risk Third-Party and Supply Chain Management

As organizations rely more on third-party vendors and complex supply chains, managing cyber risk within these external relationships has become critical.
But with so many standards, how do you know which is right for your organization? Join compliance experts Thomas Humphreys and Sophie Pothecary as
they explore how common National Institute of Standards and Technology (NIST) supply chain security frameworks can be applied to enhance visibility, cont…

Strategic AI Governance: Implementing Effective Controls in Financial Services

Strategic AI Governance: Implementing Effective Controls in Financial Services

AI is transforming every function—Legal, Compliance, Finance, IT, Operations, Third-Party Risk, and beyond. But without AI readiness, governance, and risk
management, organizations face compliance gaps, security vulnerabilities, and ethical challenges. How can you integrate AI governance effectively? Do you
have the right data, frameworks, and controls to manage AI’s risks and opportunities? Is your AI strategy future-proof against rapid advancements? Join ou…

How to Govern the Use of AI in Third-Parties with Michael Rasmussen of GRC 2020

How to Govern the Use of AI in Third-Parties with Michael Rasmussen of GRC 2020

Artificial Intelligence (AI) has revolutionized how businesses get work done, offering enhanced efficiency and streamlined decision-making. However, AI usage
in third-party relationships introduces a host of governance challenges, from ethical considerations and compliance risks to data security and accountability
concerns. Watch Michael Rasmussen, GRC Pundit and principal analyst at GRC 20/20, and Henry Umney, managing director of GRC strategy at Mitratech, a…

Top Tips for Filling in Third-Party Due Diligence Gaps

Top Tips for Filling in Third-Party Due Diligence Gaps

Considering the growing dependency on third-party relationships, ensuring the security, compliance, and operational resilience of your vendors and suppliers
is more critical than ever. Yet, even the most robust due diligence programs can leave gaps that expose organizations to security, financial, operational, and
reputational risks. Join Bryan Littlefair, past Global CISO of Vodafone Group and Aviva, as he uncovers the most common weaknesses in third-party due dili…

Preparing for NIS2/CMMC -  the Evolving Cybersecurity Regulatory  Landscape in 2025

Preparing for NIS2/CMMC - the Evolving Cybersecurity Regulatory Landscape in 2025

Third-party risk professionals must prioritise holding vendors and partners accountable to internal cybersecurity standards to mitigate the risks posed by
potential cyber-attacks. Building and maintaining resilient relationships with third parties—from the initial contracting phase through the partnership
lifecycle—is critical to safeguarding data integrity and ensuring timely, transparent incident reporting. With increasing regulatory focus on cybersecurity, su…

How to Incorporate 4th Parties Into Your TPRM Program

How to Incorporate 4th Parties Into Your TPRM Program

Fourth and Nth parties are the vendors of your vendors – many of which you may not even be aware of. With increasing numbers of supply chain breaches,
understanding risks in your extended vendor ecosystem is more critical than ever. The problem is that most risk management programs cannot effectively
evaluate threats at all levels of a supply chain without the right visibility. Join Bob Wilkinson, CEO of Cyber Marathon Solutions and former CISO at Citigroup…

Practical Cyber Maturity Solutions for Automotive Risk Professionals

Practical Cyber Maturity Solutions for Automotive Risk Professionals

As trends and advancements in the automotive industry (like autonomous driving or artificial intelligence) continue to drive a flurry of regulatory activity and
recalls, maintaining a strong cyber maturity framework has become not only a matter of regulatory compliance – but a critical driver of stakeholder
confidence and larger competitive advantage. Join Mitratech and ETAS for this exclusive webinar, where we will explore practical solutions designed to help…