Wednesday, June 12th, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

5:30pm — 8pm ET | Atlanta, GA

Event Overview

Navigating the complexities of cybersecurity today means managing both evolving risks and a diverse ecosystem of third-party vendors. The interconnectivity of modern businesses has created an intricate web of vendors, partners, and service providers, each presenting potential vulnerabilities that can disrupt operations. How can organizations proactively manage these risks and maintain a resilient vendor ecosystem?

Guided by insights from Jeffrey Wheatman, Senior Vice President and Cyber Risk Evangelist at Black Kite, this exclusive roundtable brings together cybersecurity leaders to explore strategies for detecting, managing, and mitigating cyber risks throughout the entire supply chain. Participants will delve into the benefits of proactive collaboration with vendors and discuss real-world solutions for continuous risk detection and response.

Register for this executive roundtable for new insights and discussion about:

DISCUSSION POINTS

  • Strategies for establishing clear communication channels with vendors to ensure timely responses to detected risks.

  • The role of continuous assessment and monitoring in maintaining visibility over an organization’s digital and physical supply chain.

  • Best practices for aligning business objectives with cybersecurity goals to foster a secure and resilient vendor ecosystem.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Sean Mack

Speaker, Author and former CIO & CISO

Wiley

Jeffrey Wheatman

Senior Vice President and Cyber Risk Evangelist

Black Kite

Speakers

Join Sean Mack for a moderated discussion that will feature insight from Jeffrey Wheatman, Senior Vice President and Cyber Risk Evangelist at Black Kite. 

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Anthony Pierce

Field CTO

Splunk

Tony is a Field CTO at Splunk who focuses on Cyber Security Outcomes. As the former North America Leader for Security Information and Event Management (SIEM), Solutions Architect and Alliance leader at EY he has a wide range of knowledge focusing on Data to outcomes and intimate knowledge of other SIEM and data logging and Monitoring solutions. 

Tony comes from the Department of Cybercommand National Defense Cyber Protection Teams (CPT) and the Joint Special Operations Command (JSOC) where he had a diverse and in-depth understanding of Red, Purple and Blue team operations across a global Threat Landscape. 

Tony has developed a methodology called the “Outcome Based approach” which focuses on a Data centric, Functional Approach to Defense in Depth from tactical outcomes, strategic decision making and Operational Resilience focusing on the entirety of the Ecosystem as one system which has been successfully tested in real world events in the Private and Public Sector.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Atlanta, GA

Venue to be announced

Underwritten by

Black Kite’s deep insights help you ease the stress of cyber ecosystem risk management. They do this by giving you more than a risk score. Their automated system provides real-time and accurate risk intelligence. Their data is accurate, reliable and detailed so you can improve business resilience by making informed risk decisions across your entire ever-changing cyber ecosystem.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration

June 6 - 7, 2024

Southeast Asia Summit: Cybersecurity & CIO.inc Business Transformation Conferences

April 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare

Upcoming ISMG Events

May 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience

April 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit

April 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration