TUESday, OCTOBER 1ST, 2024

Proactive Cyber Third-Party Risk Management: Gaining Control

5:30pm — 8pm CT | Dallas, TX

Event Overview

Navigating the complexities of cybersecurity today means managing both evolving risks and a diverse ecosystem of third-party vendors. The interconnectivity of modern businesses has created an intricate web of vendors, partners, and service providers, each presenting potential vulnerabilities that can disrupt operations. How can organizations proactively manage these risks and maintain a resilient vendor ecosystem?

Guided by insights from Jeffrey Wheatman, Senior Vice President and Cyber Risk Evangelist at Black Kite, this exclusive roundtable brings together cybersecurity leaders to explore strategies for detecting, managing, and mitigating cyber risks throughout the entire supply chain. Participants will delve into the benefits of proactive collaboration with vendors and discuss real-world solutions for continuous risk detection and response.

Register for this executive roundtable for new insights and discussion about:

DISCUSSION POINTS

  • Strategies for establishing clear communication channels with vendors to ensure timely responses to detected risks.

  • The role of continuous assessment and monitoring in maintaining visibility over an organization’s digital and physical supply chain.

  • Best practices for aligning business objectives with cybersecurity goals to foster a secure and resilient vendor ecosystem.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Tom Field

SVP Editorial

ISMG

Jeffrey Wheatman

Senior Vice President and Cyber Risk

Evangelist

Black Kite

Speakers

Join Tom Field for a moderated discussion that will feature insight from Jeffrey Wheatman, Senior Vice President and Cyber Risk Evangelist at Black Kite. 

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Anthony Pierce

Field CTO

Splunk

Tony is a Field CTO at Splunk who focuses on Cyber Security Outcomes. As the former North America Leader for Security Information and Event Management (SIEM), Solutions Architect and Alliance leader at EY he has a wide range of knowledge focusing on Data to outcomes and intimate knowledge of other SIEM and data logging and Monitoring solutions. 

Tony comes from the Department of Cybercommand National Defense Cyber Protection Teams (CPT) and the Joint Special Operations Command (JSOC) where he had a diverse and in-depth understanding of Red, Purple and Blue team operations across a global Threat Landscape. 

Tony has developed a methodology called the “Outcome Based approach” which focuses on a Data centric, Functional Approach to Defense in Depth from tactical outcomes, strategic decision making and Operational Resilience focusing on the entirety of the Ecosystem as one system which has been successfully tested in real world events in the Private and Public Sector.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Dallas, TX

Venue to be announced

Underwritten by

Black Kite’s deep insights help you ease the stress of cyber ecosystem risk management. They do this by giving you more than a risk score. Their automated system provides real-time and accurate risk intelligence. Their data is accurate, reliable and detailed so you can improve business resilience by making informed risk decisions across your entire ever-changing cyber ecosystem.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 18, 2024

An In Depth Look at the Evolving Cyber Security Landscape

June 18, 2024

Seamless Cloud to Edge Strategies: Unlocking Hybrid IT Potential in Manufacturing

June 19, 2024

AI Data Ready Centers: Modernizing Manufacturing to Drive Innovation and Optimize Costs

June 20, 2024

Cyber Security Summit: North America Midwest

June 20, 2024

Enhancing Banking Security: Moving Beyond Awareness 1.0

Upcoming ISMG Events

June 18, 2024

An In Depth Look at the Evolving Cyber Security Landscape

June 18, 2024

Seamless Cloud to Edge Strategies: Unlocking Hybrid IT Potential in Manufacturing

June 19, 2024

AI Data Ready Centers: Modernizing Manufacturing to Drive Innovation and Optimize Costs