&

Third-Party Risk Management

In Partnership with:

CYBERSYMPOSIUMS HOSTS

Discussion Panelists

  • Ankush Chowdhary, SVP & CISO, HP Enterprise
  • Don Cox, CISO, American Public Education
  • Zaheer Shaikh, CISO, Al Maryah Community Bank
  • Jim Rutt, CIO/CISO, The Dana Foundation
  • Asish Atri, CISO, InvestCloud
  • Merlin Namuth, CISO, City and County of Denver
  • Sam Rehman, CISO and SVP, Epam Systems
  • Dean Sapp, CISO, Filevine
  • Omar Khawaja, CISO, Databricks
  • Timothy Amerson, Founder/CEO/CISO, CASMO
  • Andrew Otashen, CISO, Marketplace
  • Patrick Angel, CISO, WGroup
  • Mark Butler, CISO, Trace3
  • Greg Rogers, CISO, GuidePoint Security
  • Curtis Blais, CISO, Cybera

Sponsors

Third-Party Risk Management PROGRAM HOSTS

Anton Chuvakin

Security Advisor

Google Cloud

Amit_Sharma

Luke Nordlie

Global Head of Business Development

S&P Global

Amit_Sharma

Matthew Moog

Principal - Risk Managed Services

EY

Matthew Moog

David London

Managing Director

The Chertoff Group

David London

Saima Sabir

Managing Director

SHS PM Consulting

Saima Sabir

Tolulope Mabo

Cybersecurity Professional

Tolulope Mabo

Blake Hoge

Senior Security Engineer

Airbnb

Blake Hoge

Branan Cooper

Financial services executive — operations & risk management

Branan Cooper

Brian Peister

SVP — AI, Cyber, Cloud and Third-Party Risk Management (TPRM)

BNY Mellon

Brian Peister

Daniel Hartnett

GTM Strategy Leader

Daniel Hartnett

Elizabeth Blosh Myers

CTPRP | Third Party Risk Management (TPRM)

Elizabeth Blosh Myers

Eric Rosendaul

Seasoned Third Party Risk Professional

Eric Rosendaul

Jesse Lamoreux

Director — GRC Risk

Jesse Lamoreux

Kayne McGladrey

CISO in Residence

Hyperproof

Kayne McGladrey

Kristi Hoffmaster

GRC | Third Party Risk Management | AI & Software Supply Chain Security

Kristi Hoffmaster

Mary Carmichael

Leading IT Risk, Cybersecurity, and Audit Programs

Mary Carmichael

Patricia Catharino

US Head of Risk Management & Internal Controls (SVP)

Banco Itaú Int.

Patricia Catharino

Sammy Migues

AppSec Program Development & Assessment | vCISO

Sammy Migues

Shweta Parida

Third Party Risk Management

Shweta Parida

Subramanian "Subbu" Annaswamy

Technology Risk Executive

Subramanian

Wayne Scott

GRC Solutions Lead

Escode (NCC Group)

Wayne Scott

Willy Fabritius

Information Resilience • InfoSec • AI • Privacy • Business Continuity • IIOA rep

ISO committees

Willy Fabritius

Henry Stanley

Co-Founder & CPO

Fabrik

Willy Fabritius

Steve Cobb

CISO

SecurityScorecard

Willy Fabritius

Jonathan Ehret

Vice President, Strategy & Risk, RiskRecon

Mastercard

Willy Fabritius

Tyler Argue

President & CEO

Westbridge Ventures Canada LP

Tyler Argue

Laura Valente

Director, Compliance

General Bank of Canada

Willy Fabritius

Nate Lee

CISO

B2B Scaleup

Willy Fabritius

Nick Patel

Third Party Risk Consultant

Willy Fabritius

Blake Hoge

Managing Partner

AmplifyGRC

Blake Hoge

Desire Banse

Manager - Security Operations

IdeaCrew

Desire Banse

Jeff Sowell

VP Information Security, CISO

One Technologies

Jeff Sowell

Joshua Kuntz

CISO

Texas Workforce Commission

Joshua Kuntz

Keith Frantz

Director, Vendor Management

Prosper Marketplace

Keith Frantz

Stacey Custeau

AVP, Third Party Risk Management

Unum

Stacey Custeau

Shamial Afzal

Global Head of Strategic Supplier Oversight

L&G

Stacey Custeau

Verity Billson

Group Head of Third Party Risk Management

Experian

Stacey Custeau

TOPICS

DATE
TIME
TOPIC
July
LIVE NOW
View Panel
TBD

Panel: Breaking Down Silos: Creating Integrated Third-Party Risk Management Programs
  • Rob Sheehan
  • Vincent Scales
  • Teresa Burton
  • Ram Vemula
  • Henry Stanley

PANEL:

Breaking Down Silos: Creating Integrated Third-Party Risk Management Programs

Join our expert panel as they tackle the complexities of creating integrated Third-Party Risk Management (TPRM) programs. Discover strategies to break down silos within organizations, enhance collaboration, and foster a unified approach to risk management. Learn how shared data models and effective communication can transform TPRM from a compliance checkbox into a vital decision-making tool for enterprise resilience.

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Leveraging AI for Automation in Third-Party Risk Management
  • Dr. Angela Dogan
  • Greg Rasner
  • Paul Kurtz
  • Teresa Burton

PANEL:

Leveraging AI for Automation in Third-Party Risk Management

Join our panel discussion where experts explore how AI can enhance efficiency and effectiveness in managing third-party risks. Discover key strategies for integrating AI into existing frameworks, ensuring data safety, and maintaining transparency. Learn how to navigate the evolving landscape of AI applications while addressing compliance and governance challenges in your organization. Don’t miss this insightful conversation!

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Data Governance in Action: Defining Responsibility and Implementing Controls
  • Regine Bonneau
  • Lily Yeoh
  • Naomi Ward
  • Dr. Angela Dogan

PANEL:

Data Governance in Action: Defining Responsibility and Implementing Controls

Join our panel discussion where experts delve into the critical importance of data governance in today’s data-driven landscape. Discover how organizations can establish clear responsibilities, implement effective controls, and foster a culture of accountability around data management. Learn actionable strategies for navigating regulatory requirements while ensuring data security and compliance across various sectors. Don’t miss this essential conversation!

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Building a Comprehensive Third-Party Risk Management Framework
  • Greg Rasner
  • Paul Kurtz
  • Rob Sheehan
  • Franchesca Williams

PANEL:

Building a Comprehensive Third-Party Risk Management Framework

Learn how leading TPRM practitioners define critical vendors, map frameworks (Interagency guidance, NIST), and turn risk based intake into repeatable onboarding, continuous monitoring and clean offboarding. Panelists tackle fourth‑party visibility, SBOMs, contractual controls and practical playbooks—plus three actionable startup steps (pick a framework, cover the vendor lifecycle and enforce governance/inventory)—so security and procurement teams can stop firefighting and scale third‑party risk.

Related Solutions

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Emerging AI Technologies and Their Impact on Third-Party Risk Management
  • Clarence Chio
  • Greg Rasner
  • Rob Sheehan
  • Teresa Burton

PANEL:

Emerging AI Technologies and Their Impact on Third-Party Risk Management

Expert risk practitioners cut through the AI hype to clarify how emerging AI can transform third‑party risk management—accelerating document review, enabling continuous monitoring and surfacing risk‑by‑exception—while preserving human judgment. Hear practical questions to ask vendors about data, training and model provenance, plus regulator‑ready controls, trust‑center strategies and actionable steps to embed AI safely into your TPRM program.

Related Solutions

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Implementing a Risk-Based Approach in Third-Party Risk Management: Strategies, Challenges and Best Practices
  • Paul Kurtz
  • Vincent Scales
  • Tiffany Bray
  • Bob Kolasky

PANEL:

Implementing a Risk-Based Approach in Third-Party Risk Management: Strategies, Challenges and Best Practices

Learn how to implement a risk based approach to third party risk management—tier vendors, align due diligence to inherent vs. residual risk and use automation and continuous monitoring to scale coverage. Watch the panel for practical strategies, challenges and best practices from industry experts to streamline vendor oversight, reduce questionnaire fatigue and boost operational resiliency with real‑world examples and action‑ready templates.

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Developing a Risk-Aware Culture: Engaging Internal Stakeholders in Third-Party Risk Management
  • Yair Solow
  • Oliver Jones
  • Jamie Morrison
  • Paul Kurtz

PANEL:

Developing a Risk-Aware Culture: Engaging Internal Stakeholders in Third-Party Risk Management

Join practitioners building a risk‑aware culture that makes third‑party risk everyone’s business—covering ownership and governance, board‑level tone, risk appetite, and how procurement, security and operations share accountability. Speakers give practical tactics—risk‑based gating, internal champions, proportional automation, continuous monitoring and KPIs—to reduce exposure, speed decisions and prove value, plus quick, actionable steps you can start using tomorrow.

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Measuring and Communicating Third-Party Risk: Metrics and Reporting
  • Linda Tuck Chapman
  • Rob Sheehan
  • Franchesca Williams
  • Bob Kolasky

PANEL:

Measuring and Communicating Third-Party Risk: Metrics and Reporting

Cut through KPI noise with leading practitioners who unpack how to measure and report third‑party risk—translating risk appetite into actionable KRIs, spotting concentration and financial‑viability red flags, and using continuous monitoring and regtech/AI to quantify residual exposure. Hear war stories, board‑ready dashboards and step‑by‑step tactics to turn metrics into decision support so you can prioritize, escalate and reduce supplier‑driven surprises.

Related Solutions

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: The Role of Cybersecurity in Third-Party Risk Management
  • Paul Kurtz
  • Greg Rasner
  • Jamie Morrison
  • Tyrone Watson
  • Todd Boehler

PANEL:

The Role of Cybersecurity in Third-Party Risk Management

Leading security and TPRM experts unpack how cybersecurity drives third‑party risk management—from risk‑based vendor tiers, SBOMs and continuous monitoring to contract clauses, incident notification and offboarding controls, with real‑world examples and board‑ready metrics. Attendees will get practical strategies—AI‑assisted data‑first assessments, targeted questionnaires, tabletop readiness exercises and vendor collaboration tips—to reduce exposure, speed response and build resilient supply chains.

Related Solutions

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Understanding the Third-Party Risk Landscape: Trends and Challenges
  • Paul Kurtz
  • Tyrone Watson
  • Greg Rasner
  • Lily Yeoh

PANEL:

Understanding the Third-Party Risk Landscape: Trends and Challenges

Join industry leaders as they map today’s third‑party risk landscape—covering software supply‑chain attacks, SBOM challenges, questionnaire fatigue and the double‑edged role of AI in scaling risk assessment and vendor monitoring. Learn practical strategies—risk‑based questionnaires, vendor tabletop exercises, resilience planning and automation with human oversight—to boost visibility, manage unknowns and turn vendor relationships into security assets before the next breach.

Related Solutions

CEO Perspective: TerraTrue

Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.

Read more..

Technology Demo: Securing Global Supply Chains

This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.

Read more..

Technology Demo: Black Kite

This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating

Read more..

Technology Demo: Dynamic Threat Intelligence

This shows how Avertro integrates real-time threat intelligence with your unique operational context and enables you to anticipate how threats might unfold and identify vulnerabilities before they can be exploited.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD
AI Icon
Procurement + Business Owners: Collaborative Solutions for Third-Party Risk
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Managing Third-Party Risk Associated with Geopolitical Issues
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Cyber Risk Introduced through Emerging Technologies
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Contracting for Resilience: Legal Strategies to Mitigate Third‑Party Risk
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Integrating Vendor Spend into Third-Party Risk Monitoring
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Environmental, Social and Governance (ESG) Considerations in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
End-to-End Vendor Risk Oversight
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Continuous Monitoring and Business Resilience in TPRM
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Building and Maturing AI Risk Frameworks in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Governance and Oversight of Third Parties: Beyond Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Evolving Policies and Regulations in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Dynamic Risk Assessment: Continuous Monitoring for Evolving Third-Party Risks
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
DORA & NIS2: Navigating Compliance Standards in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Navigating TPRM Exceptions, Risk Acceptance and Related Processes
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Implementing a Risk-Based Approach in Third-Party Risk Management: Strategies, Challenges and Best Practices
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Breaking Down Silos: Creating Integrated Third-Party Risk Management Programs
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Driving Success: Leadership’s Evolving Role in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Speaking the C-Suite’s Language: Effectively Communicating Third-Party Risk
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Bridging the Gap: Uniting Technology and Business in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
High‑Risk Decisions: Quantifying Third‑Party Risk and Financial Exposure
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Turning Compliance into Value: Leveraging Third-Party Risk Regulations for Business Advantage
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Navigating Ethics: Responsible Use of AI in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Fostering a Risk-Aware Culture: Engaging Employees in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
AI in Action: Enhancing Third-Party Risk and Compliance Programs
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Aligning Legal, Security, and Procurement: Building a Unified Third-Party Risk Framework
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Data Governance in Action: Defining Responsibility and Implementing Controls
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Navigating Conflicting Priorities: Business Ambitions and Risk Management Realities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Evaluating Risk: Product vs. Vendor—Where Should You Focus?
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Harnessing AI and Machine Learning for Enhanced Third-Party Risk Assessment
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Building a Comprehensive Third-Party Risk Management Framework
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Leveraging AI for Automation in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Assessing and Monitoring Third-Party Risks: Best Practices
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Third-Party Risk Management in the Supply Chain
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Leveraging Technology and Automation in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Regulatory Compliance and Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
AI-Driven Cybersecurity Strategies in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Building Strong Relationships with Third-Party Vendors
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Incident Response and Third-Party Risk: Preparing for the Unexpected
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Measuring and Communicating Third-Party Risk: Metrics and Reporting
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Impact of Globalization on Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Developing a Risk-Aware Culture: Engaging Internal Stakeholders in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Segment to Secure: Prioritizing Third Parties for Risk‑Based Oversight
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Relationship Management: From Contracts to Performance and Financial Oversight
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Risk Monitoring That Works: Governance, Controls and the Right Frequency
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Technology Risk Beyond AI: Vendor Stack, Lifecycle and Maintenance Due Diligence
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Fourth‑Party Risk: Managing Exposure to Your Vendor's Vendors
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Too Many Eggs in One Basket: Managing Concentration Risk Across the Enterprise
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Third-Party Risk Meets Incident Response: Closing the Gaps Between Prevention and Recovery
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Know Your Vendors: Practical Strategies for Complete, Living Third-Party Inventories
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
From Indicators to Impact: Integrating Threat Intelligence into Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Regaining Control of the Supply Chain: Empowering Organizations to Make Informed Decisions on Data and Services
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Moving Beyond Compliance: Cultivating a True Security Mindset in Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Treating Third-Party Risk Like First-Party Risk: Empowering Organizations to Own Their Cybersecurity Posture
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Budgeting and Financial Alignment for Successful Third-Party Risk Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Communicating Third and Fourth-Party Risk to the Board: Driving Culture Change Through Transparency
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Planning for AI Regulation in 2027–2028: Preparing Third-Party Risk Programs for What’s Coming
AI SESSION
TPRM Technology Map
TPRM Technology Map preview