Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How to Prepare, Manage, and Recover from Inevitable Business Disruptions Dan Lohrmann, Presidio | Earl Duby, Lear Corporation | Richard Meeus, Akamai | Sammy Migues, Synopsys Cyber security breaches are becoming increasingly more public and costly affairs, leading organizations to pay a closer look at their current and futu... 3 weeks ago | 63 mins Cybersecurity and March Madness Christos Kalantzis, CTO, SecurityScorecard | Josh Fazio, VP Solutions Architects, SecurityScorecard Join us March 22, 2023 from 1:00 - 1:45 pm CST as we get fired up for March Madness™ and discuss cybersecurity. Oftentimes high profile events like M... March 22, 2023 6:00pm Adopting Proactive Automation for Transformation to Lean NetOps (Americas) Claudio Pallais, Senior Content Marketing Manager With skilled labor constraints due to cutbacks, reactive manual troubleshooting practices means higher risk of downtime. Network downtime leads to los... 11 hours ago | 23 mins Taking a Strategic Approach to Your Third-Party Risk Management Program Richard Marcus - VP, Information Security, AuditBoard Who has access to your company’s data and what risks do they pose to your organization? While these questions seem basic, most organizations cannot co... April 5, 2023 4:00pm Emerging Third-Party Risk Trends Beyond the CISO Office Experts from EY and AuditBoard Management and boards are pushing to do more with less and as a result are turning to third parties to stay competitive. This strategy, however, comes... 2 weeks ago | 60 mins Understand the Wow Factor of Expanded Vendor Intelligence Perry Robinson, Senior Solutions Architect | Vanessa Sorenson, Senior Product Marketing Manager Go beyond traditional TPRM and use expanded vendor intelligence to automate and scale your third-party and fourth-party risk management workflows. Jo... 2 weeks ago | 39 mins Adopting Proactive Automation for Transformation to Lean NetOps (EMEA) Claudio Pallais, Senior Content Marketing Manager With skilled labor constraints due to cutbacks, reactive manual troubleshooting practices means higher risk of downtime. Network downtime leads to los... 17 hours ago | 20 mins Best Practices for Effective Third-Party Security Risk Management Andrew Moyad, CEO, Shared Assessments, Shared Assessments, Dov Goldman, Director of Risk and Compliance, Panorays InfoSec, IT risk and digital supply chain management professionals know the key to minimizing the risk of third-party breaches: implementing a compreh... 4 weeks ago | 62 mins How to Manage Risk & Compliance in Third-Party Relationships Amy Cravens, Research Manager, Governance, Risk, and Compliance, IDC | Richard Marcus, VP or Information Security, AuditBoard Every enterprise has hundreds if not thousands of third-party relationships – vendors, partners, clients – that they rely on for products and services... April 19, 2023 4:00pm Close Encounters of the Third (and Fourth) Party Kind Wade Baker, Partner, Cyentia Institute | Vanessa Sorenson, Sr. Product Marketing Manager, SecurityScorecard Mitigating risks between your third- and fourth-party vendors SecurityScorecard and the Cyentia Institute teamed up to analyze data from SecurityScor... 4 weeks ago | 32 mins Load more