Tuesday, April 29th 2025

A Modern Approach to Third-Party Risk Assessments

5:30 - 8:00 PM PT | San Francisco, CA

Event Overview

According to recent research from VentureBeat, 54% of security breaches occur through third-party relationships.

Meanwhile, according to Forrester, 69% of risk decision-makers identified their third-party risk management program as manual. “Even more concerning: Just 30% indicated that their organization’s TPRM program evaluates at least half of its existing third-party relationships.”

It is beyond time for a third-party risk assessment overhaul.

From risk-ranking to scope and scale of assessments, from automated tools to AI-powered decision making, a modern, efficient approach to third-party risk assessment will help fill these potentially costly vulnerability gaps.

Join us for a discussion on modernizing third-party risk assessments. We’ll cover 10 steps toward a modern program and how you can reimagine vendor risk assessments, including:

  • How to classify and tier your vendors via inherent risk.

  • Where and how to add automation to assessments.

  • How to employ AI to assess and monitor lower-risk third parties.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Tom Field

SVP Editorial

ISMG

 

Shane Hasert

Director-Threat Analysis and Cyber

Security Standard

ProcessUnity

Speakers

Guided by Tom Field and Shane Hasert, at event sponsor ProcessUnity, the roundtable will also draw on the experiences of the attendees, who will discuss  third-party risk assessments modernization.

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Subject matter expert

Shane Hasert

Director-Threat Analysis and Cyber Security Standards

ProcessUnity

Shane Hasert possesses an impressive 33-year career as a cybersecurity professional, with 17 years dedicated specifically to third-party risk management and auditing. A veteran of the Air Force, he has held leadership positions in security programs across multiple industries, including financial services, retail, healthcare, higher education, mortgage insurance, and gaming, with several global consulting and security services firms. Mr. Hasert holds a range of prestigious certifications, including Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Controls (CRISC), Certified Data Privacy Solutions Engineer (CDPSE), Certified Third-Party Risk Assessor (CTPRA), and Certified Third-Party Risk Professional (CTPRP). Additionally, he has earned an AS in Intelligence Analysis, a BS in Business Management, and an MBA in Project Management.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

San Francisco, CA

Venue to be announced

Underwritten by

ProcessUnity’s cloud-based solutions help organizations of all sizes automate their risk and compliance programs. Its highly configurable, easy-to-use tools significantly reduce manual administrative tasks, allowing customers to spend more time on strategic risk mitigation.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain