Richard
Stiennon
CYBERSYMPOSIUMS
&
Anton Chuvakin
Security Advisor
Google Cloud

Luke Nordlie
Global Head of Business Development
S&P Global

Matthew Moog
Principal - Risk Managed Services
EY
David London
Managing Director
The Chertoff Group
Saima Sabir
Managing Director
SHS PM Consulting
Tolulope Mabo
Cybersecurity Professional
Blake Hoge
Senior Security Engineer
Airbnb
Branan Cooper
Financial services executive — operations & risk management
Brian Peister
SVP — AI, Cyber, Cloud and Third-Party Risk Management (TPRM)
BNY Mellon
Daniel Hartnett
GTM Strategy Leader
Elizabeth Blosh Myers
CTPRP | Third Party Risk Management (TPRM)
Eric Rosendaul
Seasoned Third Party Risk Professional
Jesse Lamoreux
Director — GRC Risk
Kayne McGladrey
CISO in Residence
Hyperproof
Kristi Hoffmaster
GRC | Third Party Risk Management | AI & Software Supply Chain Security
Mary Carmichael
Leading IT Risk, Cybersecurity, and Audit Programs
Patricia Catharino
US Head of Risk Management & Internal Controls (SVP)
Banco Itaú Int.
Sammy Migues
AppSec Program Development & Assessment | vCISO
Shweta Parida
Third Party Risk Management
Subramanian "Subbu" Annaswamy
Technology Risk Executive
Wayne Scott
GRC Solutions Lead
Escode (NCC Group)
Willy Fabritius
Information Resilience • InfoSec • AI • Privacy • Business Continuity • IIOA rep
ISO committees
Henry Stanley
Co-Founder & CPO
Fabrik
Steve Cobb
CISO
SecurityScorecard
Jonathan Ehret
Vice President, Strategy & Risk, RiskRecon
Mastercard
Tyler Argue
President & CEO
Westbridge Ventures Canada LP
Laura Valente
Director, Compliance
General Bank of Canada
Nate Lee
CISO
B2B Scaleup
Nick Patel
Third Party Risk Consultant
Blake Hoge
Managing Partner
AmplifyGRC
Desire Banse
Manager - Security Operations
IdeaCrew
Jeff Sowell
VP Information Security, CISO
One Technologies
Joshua Kuntz
CISO
Texas Workforce Commission
Keith Frantz
Director, Vendor Management
Prosper Marketplace
Stacey Custeau
AVP, Third Party Risk Management
Unum
Shamial Afzal
Global Head of Strategic Supplier Oversight
L&G
Verity Billson
Group Head of Third Party Risk Management
Experian
Join our expert panel as they tackle the complexities of creating integrated Third-Party Risk Management (TPRM) programs. Discover strategies to break down silos within organizations, enhance collaboration, and foster a unified approach to risk management. Learn how shared data models and effective communication can transform TPRM from a compliance checkbox into a vital decision-making tool for enterprise resilience.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.
Join our panel discussion where experts explore how AI can enhance efficiency and effectiveness in managing third-party risks. Discover key strategies for integrating AI into existing frameworks, ensuring data safety, and maintaining transparency. Learn how to navigate the evolving landscape of AI applications while addressing compliance and governance challenges in your organization. Don’t miss this insightful conversation!
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.
Join our panel discussion where experts delve into the critical importance of data governance in today’s data-driven landscape. Discover how organizations can establish clear responsibilities, implement effective controls, and foster a culture of accountability around data management. Learn actionable strategies for navigating regulatory requirements while ensuring data security and compliance across various sectors. Don’t miss this essential conversation!
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
Learn how leading TPRM practitioners define critical vendors, map frameworks (Interagency guidance, NIST), and turn risk based intake into repeatable onboarding, continuous monitoring and clean offboarding. Panelists tackle fourth‑party visibility, SBOMs, contractual controls and practical playbooks—plus three actionable startup steps (pick a framework, cover the vendor lifecycle and enforce governance/inventory)—so security and procurement teams can stop firefighting and scale third‑party risk.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
Expert risk practitioners cut through the AI hype to clarify how emerging AI can transform third‑party risk management—accelerating document review, enabling continuous monitoring and surfacing risk‑by‑exception—while preserving human judgment. Hear practical questions to ask vendors about data, training and model provenance, plus regulator‑ready controls, trust‑center strategies and actionable steps to embed AI safely into your TPRM program.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
Learn how to implement a risk based approach to third party risk management—tier vendors, align due diligence to inherent vs. residual risk and use automation and continuous monitoring to scale coverage. Watch the panel for practical strategies, challenges and best practices from industry experts to streamline vendor oversight, reduce questionnaire fatigue and boost operational resiliency with real‑world examples and action‑ready templates.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.
Join practitioners building a risk‑aware culture that makes third‑party risk everyone’s business—covering ownership and governance, board‑level tone, risk appetite, and how procurement, security and operations share accountability. Speakers give practical tactics—risk‑based gating, internal champions, proportional automation, continuous monitoring and KPIs—to reduce exposure, speed decisions and prove value, plus quick, actionable steps you can start using tomorrow.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.
Cut through KPI noise with leading practitioners who unpack how to measure and report third‑party risk—translating risk appetite into actionable KRIs, spotting concentration and financial‑viability red flags, and using continuous monitoring and regtech/AI to quantify residual exposure. Hear war stories, board‑ready dashboards and step‑by‑step tactics to turn metrics into decision support so you can prioritize, escalate and reduce supplier‑driven surprises.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
Leading security and TPRM experts unpack how cybersecurity drives third‑party risk management—from risk‑based vendor tiers, SBOMs and continuous monitoring to contract clauses, incident notification and offboarding controls, with real‑world examples and board‑ready metrics. Attendees will get practical strategies—AI‑assisted data‑first assessments, targeted questionnaires, tabletop readiness exercises and vendor collaboration tips—to reduce exposure, speed response and build resilient supply chains.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
Join industry leaders as they map today’s third‑party risk landscape—covering software supply‑chain attacks, SBOM challenges, questionnaire fatigue and the double‑edged role of AI in scaling risk assessment and vendor monitoring. Learn practical strategies—risk‑based questionnaires, vendor tabletop exercises, resilience planning and automation with human oversight—to boost visibility, manage unknowns and turn vendor relationships into security assets before the next breach.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating