Third Party Risk Management and The Cloud

Logo
Presented by

Tony Howlett, CISO, Securelink

About this talk

It seems like everything is moving to the cloud these days and vendor access management systems are no exception. It may seem to be counterintuitive to put systems that grant vendors and their reps access to on-premise systems in the cloud, but the truth is that more and more enterprise data and systems are already located there. There are also numerous other benefits to be gained such as better scalability, faster disaster recovery, and believe it or not, better compliance and security. There are also some caveats where a cloud deployment may not make sense for your vendor access management platform. We will go over all of these and answer any questions you may have regarding third-party risk management (TPRM) and the cloud. Key takeaways from this session include: • Why Third Party Risk Management is a key part of enterprise security and compliance • Benefits of a cloud based TPRM system • Downsides/Caveats of a cloud based TPRM system Cover Slide: Attached separately Presenter Bio: Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA certifications, and a B.B.A in Management Information Systems. He has previously served at CTO for Codero, a managed cloud hosting provider and CTO of Network Security Services, a security and compliance consulting firm, as well as a founder of InfoHighway Communications, one of the nation’s first high speed internet access providers. Tony is currently the CISO at SecureLink.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198861)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.