Learn the best case studies on the end to end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the Third Party & Supply Chain Cyber Security Virtual Summit.
Led by the TOP information security professionals from leading companies the discussion will give you an opportunity to see the issue from the perspective of different industries & angles and identify the complex solution to be implemented.
Learn the key trends from short interviews we take about the place of third party security in company’s ISMS and how we can manage the shift to remote the best when doing assessments.
Enough of theoretical talks! Get to know each other’s story and find the practical solution together.
Meet Information Security & TPRM experts in a theme dedicated rooms, introduce yourself and exchange an experience with your peers.
Topics to cover:
* More rooms will be created based on the interest of attendees
* We limit the capacity of every room to ensure a quality networking. Register now to reserve your place in advance
Join a one-hour training to learn practical tools on data breach response and what a good cyber-incident playbook looks like
Get cozy and learn from the experts in an interactive format.
3 streams that will cover:
From short interviews we take learn the key aspects on different countries regulatory framework when dealing with third parties.
Digitalisation vs. Regulation:
Experts will discuss a comprehensive approach on how to build a mature compliance program in a changing regulatory environment and how to establish a smooth internal collaboration between different departments?
Questions are welcome at any time!
Get cozy and learn from the experts in an interactive format.
3 streams that will cover:
Share your recent challenges with us prior the event and our speakers & partners will brainstorm together with you in an informal atmosphere of this virtual Solutions Room that every attendee can join.
Skyscanner
SouthernCarlson
Cambridge Mobile Telematics
eBay
Amazon Web Services
Truist Financial
Northern Trust Corporation
Data Privacy Analytics
Waterloo North Hydro Inc
Allstate
Almirall
Greenyard
Mubadala Capital
Tel-Aviv University
Huawei Western European Region
Yes, the participation is free of charge, if you represent an industry which is an Information Security & TPRM products’ user. You can submit your registration here and we will confirm your participation shortly after quick review;
If you represent an Information Security or TPRM solution/service providing company, the participation is 99 EUR. If you represent a law firm or consultancy – 29 EUR. You can register online here.
You may register online here
Once you are registered to the Summit, we will send you the login details for the Summit platform including the link to the detailed tutorial where you can informatively see how to use it via web browser & mobile application, where to find the streaming links and many more.
Definitely, every participant will have its virtual profile. You will be able to chat and agree on virtual meeting in our mobile app. Additionally, there will be networking breaks organised virtually to let participants interact live in a small groups.
A well known International thought leader on Information Security issues, including Risk Management and Information Security Awareness strategies. Previously helped develop one of the earliest globally successful CBT programs for Security Awareness “For Your Eyes Only”. Has held positions on various security influencing bodies including APACS, LINK and Common Criteria.
Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.
The company has over 1,300 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
Website: www.darktrace.com
Twitter: twitter.com/Darktrace/
LinkedIn: linkedin.com/company/darktrace/
RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities. RiskRecon provides the world’s easiest path to understanding and acting on third-party cyber risk, enabling security and risk teams to efficiently build scalable, third-party risk management programs for dramatically better risk outcomes. Learn more about RiskRecon, request a demo or visit the website at
www.riskrecon.com.
Twitter: https://twitter.com/riskrecon
LinkedIn: https://www.linkedin.com/company/riskrecon
Facebook: https://www.facebook.com/riskrecon/
Source Defense is the market leader in Client-side Security for websites, providing real-time threat detection, protection and prevention of vulnerabilities originating in JavaScript. The Source Defense patented Website Client-side Security Platform offers the most comprehensive & complete solution addressing threats and risks coming from the increased usage of JavaScript, libraries and open source in websites today.
The ADMIN management console, VICE sandboxing and WiPP data shield offerings utilize patented technology and are deployed by leading Fortune 500 enterprises in the Financial, Retail, and Healthcare markets. Headquartered in Israel, with branches across the US and a strong community of global valuable partnerships, Source Defense is the most innovative, reliable and trusted partner in the fight against client-side attacks.
Our Mission
Enabling companies to leverage their websites to drive business forward, further and faster, while ensuring security, compliance, and customer data privacy.
Website / LinkedIn / Facebook / TwitterCyberVadis is the first scalable solution for managing the full third-party cybersecurity risk assessment process. The CyberVadis platform is based on a methodology that maps to all major international compliance standards, and combines the speed of automation with the accuracy and effectiveness of a team of experts. This includes engaging vendors directly with assessments, validating results with an in-house team of security analysts, and issuing companies a standardized cybersecurity rating that they can share with others, along with a detailed improvement plan for increasing their score and the ability to collaborate with clients and vendors on implementing better practices.