Search results


How to Incorporate 4th Parties Into Your TPRM Program

How to Incorporate 4th Parties Into Your TPRM Program

Channel Logo
Bob Wilkinson - CEO of Cyber Marathon Solutions

Fourth and Nth parties are the vendors of your vendors – many of which you may not even be aware of. With increasing numbers of supply chain breaches,
understanding risks in your extended vendor ecosystem is more critical than ever. The problem is that most risk management programs cannot effectively
evaluate threats at all levels of a supply chain without the right visibility. Join Bob Wilkinson, CEO of Cyber Marathon Solutions and former CISO at Citigroup…

Risk-Based Approach to TPRM Due Diligence

Risk-Based Approach to TPRM Due Diligence

Channel Logo
Samira Duijnmayer. Regulator & Finaical Crime, Booking.com

Performing due diligence is pivotal in identifying, assessing, and mitigating risks associated with third-party relationships. One of the biggest trends in
third-party risk management (TPRM) is managing various types of third parties, diverse activities, and approaches to due diligence, all while adopting a
risk-based strategy. So, where do you start? Join Samira Duijnmayer of Booking.com as she leverages her experience to share insights on how robust due …

The CEO's Take: Bridging the Cybersecurity Divide To Address Cyber Risk

The CEO's Take: Bridging the Cybersecurity Divide To Address Cyber Risk

Channel Logo
Aleksandr Yampolskiy, SecurityScorecard | Joe Levy, Sophos

“150 companies account for 90% of the technology products and services across the global attack surface. 41% of those companies had evidence of at least
one compromised device in the past year.” With organizations as interconnected as they are, even organizations who “have” good cybersecurity are only as
good as their weakest link. Join Aleksandr Yampolskiy (SecurityScorecard) and Joe Levy (Sophos) for their take on: -- Shifts in the cybersecurity landscape (…

Optimizing Risk Classification in Nth Party Relationships

Optimizing Risk Classification in Nth Party Relationships

Channel Logo
Conner Reznicek, HackNotice; Sean McGovern, LogicGate; Steve Tobias, RiskRecon; and John Bree, Supply Wisdom.

Understanding the intricacies of nth party relationships is paramount for effective risk management. Optimizing risk classification in nth party relationships
entails a multifaceted approach geared towards enhancing visibility, comprehending dependencies, and implementing proactive risk management strategies.
In this webinar we will delve into the concept of nth party relationships, the inherent risks involved, and strategies for optimizing risk classification in these …

Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA Deadline

Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA Deadline

Channel Logo
Juliane Kagermeier, Senior Manager KPMG Deutschland, Nicolas Tauber, Manager Financial Services KPMG Deutschland, Claudia Howe Executive Director for GRC Solutions at Mirtatech & Henry Umney Managing Director of GRC Strategy at Mitratech

From real-life examples of conducting thorough business impact assessments and protection need evaluations to pinpointing potential compliance
weaknesses and disruptions, our experts will guide you through the intricate process of mapping vendors to critical business functions. Ready to bridge the
gap between your vendor management and Third-Party Risk Management (TPRM)? Join us on for our webinar and walk away with insights on how to: - Id…

(German Version) Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA Deadline

(German Version) Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA
Deadline

Channel Logo
Ali Alam, Senior Manager, KPMG Netherlands, Nicolas Tauber, Manager Finaical Services, KPMG Deutschland, Claudia Howe Executive Director of GRC Solutions, Mitratech, & Felix Schock VP of Professional Services, Mitratech

From real-life examples of conducting thorough business impact assessments and protection need evaluations to pinpointing potential compliance
weaknesses and disruptions, our experts will guide you through the intricate process of mapping vendors to critical business functions. Ready to bridge the
gap between your vendor management and Third-Party Risk Management (TPRM)? Join us for our webinar and walk away with insights on how to: - Iden…

Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA Deadline with KPMG

Ensuring Compliance and Operational Resilience Ahead of the January 2025 DORA Deadline with KPMG

Channel Logo
Ali Alam, Senior Manager at KPMG Netherlands, Nicolas Tauber, Manager Financial Services at KPMG Deutschland, Claudia Howe, Executive Director for GRC Solutions at Mitratech, Henry Umney, Managing Director for GRC Strategy at Mitratech

Watch this webinar on demand to learn how to prepare your organization to meet the DORA compliance deadline in January 2025, with practical steps to
achieve readiness within the one-month compliance window. Our experts walk you through how to: - Gain insights into which mandatory contract clauses
are required for vendors and nth parties to ensure compliance and mitigate risk. - Link these processes to a robust control framework and regulatory tec…

The CISO’s Take: Navigating Risk, Resource Constraints, Compliance, & More

The CISO’s Take: Navigating Risk, Resource Constraints, Compliance, & More

Channel Logo
Aleksandr Yampolskiy, SecurityScorecard | Tom Quinn, T. Rowe Price

99% of Global 2000 companies are directly connected to vendors that have had recent breaches, per our latest collaboration with the Cyentia Institute. (Isn’t
that a thought just in time for spooky season?!) Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Tom Quinn (CISO, T. Rowe Price) as
they dive into: - 3rd-, 4th-, and nth- party risk management with respect to evolving business needs - Navigating the new normal of CISOs, including compli…

Fourth Parties And Beyond: Managing Risk In The Extended Supply Chain

Fourth Parties And Beyond: Managing Risk In The Extended Supply Chain

Channel Logo
Andrew Moyad, CEO, Shared Assessments. John Bree, CRO, Supply Wisdom. Michelle Clement. Charles Forde, Nomura.

Just as managing the risk of your direct suppliers is critical, understanding the risk of your suppliers' suppliers is imperative. While you may work most directly
with secure third-party vendors and platforms, unknown Fourth Parties (vendors of vendors) can cause significant disruptions to your business. How do you
manage the threats posed by these Fourth or Nth Parties? Participants will learn practical ways to identify and manage fourth parties through an overview o…

DORA compliance explained: what it means for your business

DORA compliance explained: what it means for your business

Channel Logo
Oliver Breakow (Dir, Technical Marketing - Network Security), Jesus Corder (SE Director SASE and Cloud)

With the Digital Operational Resilience Act (DORA), the EU is set to revolutionise the IT security and resilience of financial companies. This groundbreaking
legislation impacts not only banks, insurance companies, and investment firms but also critical information and communication technology (ICT) providers
that work with financial institutions. DORA complements other key regulations such as NIS2, FCA, and LkSG, with the shared goal of strengthening operatio…