ABOUT THE SUMMIT

Learn the best case studies on the end to end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the Third Party & Supply Chain Cyber Security Virtual Summit.

  • How much of your data security is really under your control?
  • What is your risk management approach towards your suppliers?
  • How to secure your network and protect your sensitive data?

 

Led by the TOP information security professionals from leading companies the discussion will give you an opportunity to see the issue from the perspective of different industries & angles and identify the complex solution to be implemented.

JOIN US ONLINE AND BUILD YOUR END TO END STRATEGY!

SUMMIT AGENDA 2021

Day 1

Learn the key trends from short interviews we take about the place of third party security in company’s ISMS and how we can manage the shift to remote the best when doing assessments.

Enough of theoretical talks! Get to know each other’s story and find the practical solution together.

Meet Information Security & TPRM experts in a theme dedicated rooms, introduce yourself and exchange an experience with your peers.

Topics to cover:

  • Third party security evaluation: standards, tools and resources
  • Continuous cyber risk monitoring implementation
  • Building a third party risk management program from ground zero
  • Effective fourth parties’ oversight to mitigate potential risks
  • Shared assessments in action: potential risks
  • IT vendor risk management tools’ overview
  • Building a functional sourcing model
  • European framework for cyber security risk assessment
  • Blockchain technology deployment in supply chain security
  • 5G networks risk assessment

* More rooms will be created based on the interest of attendees

* We limit the capacity of every room to ensure a quality networking. Register now to reserve your place in advance

Join a one-hour training to learn practical tools on data breach response and what a good cyber-incident playbook looks like

Get cozy and learn from the experts in an interactive format.

3 streams that will cover:

  • IT Security Evaluation & Audit
  • Third Party Risk Management
  • Cloud Security Challenges and Supply Chain Risks

Day 2

From short interviews we take learn the key aspects on different countries regulatory framework when dealing with third parties.

Digitalisation vs. Regulation:
Experts will discuss a comprehensive approach on how to build a mature compliance program in a changing regulatory environment and how to establish a smooth internal collaboration between different departments?


Questions are welcome at any time!

Get cozy and learn from the experts in an interactive format.

3 streams that will cover:

  • Third Party Due Diligence at the global scale
  • Insider Threat in a remote environment
  • Cyber risks of IoT and A.I. automation

Share your recent challenges with us prior the event and our speakers & partners will brainstorm together with you in an informal atmosphere of this virtual Solutions Room that every attendee can join.

The amount of attendees is limited.
Reserve your place today to secure the pass.

OUR SPEAKERS 2021

Veroniki Stamati

Veroniki Stamati

Information Security & Privacy Lead

Skyscanner

Norman Kromberg

Norman Kromberg

Vice President Information Security

SouthernCarlson

Keavy Murphy

Keavy Murphy

Manager of Cyber Risk and Compliance

Cambridge Mobile Telematics

Jean-Francois Valette

Jean-Francois Valette

Global Vendor Mngmt Compliance Leader

eBay

Shaobin Wang

Shaobin Wang

Head of Security Business Dev Platform, AWS GCR

Amazon Web Services

Greg Rasner

Gregory Rasner

Sr. Director, Cyber Third Party Risk

Truist Financial

Saket Sinha

Saket Kumar Sinha

Head of Third Party Due Diligence

Northern Trust Corporation

Annick O'Brien копия

Annick O'Brien

Compliance & Data Privacy Counsel

Data Privacy Analytics

Mark Dillon

Mark Dillon

VP of IT

Waterloo North Hydro Inc

Tony Giannino

Tony Giannino

Senior Manager, Information Security

Allstate

Ramon SERRES

Ramón Serres

Head of Information Security, CISO

Almirall

Johan Stronkhorst

Johan Stronkhorst

Group ICT Security Manager, CISO

Greenyard

Shafiullah Ismail

Shafiullah Ismail

Head, Information Security Architecture & GRC

Mubadala Capital

Dr. Jacob Mendel

Jacob Mendel

Associate Professor

Tel-Aviv University

Bob-Xie

Bob Xie

Cyber Security Officer

Huawei Western European Region

SUMMIT PARTNERS 2021

MEDIA PARTNERS

logo (1)
CPO_Magazine_logo_black_2048
DFM
MyTechMag _Logo

MORE OPPORTUNITIES

SPEAKER

SEND

MEDIA

SEND

SPONSOR

SEND

STARTUP

SEND

WHY TO ATTEND

Learn & keep up with industry trends
Network & exchange ideas with your peers
Talk to the existing suppliers & your potential partners

WHO SHOULD ATTEND

Job title

Chiefs, Heads, Directors, Managers of:

and everyone who is passionate about cyber security!

Industry

FAQ

  • Yes, the participation is free of charge, if you represent an industry which is an Information Security & TPRM products’ user. You can submit your registration here and we will confirm your participation shortly after quick review;

  • If you represent an Information Security or TPRM solution/service providing company, the participation is 99 EUR. If you represent a law firm or consultancy – 29 EUR. You can register online here.

You may register online here

Once you are registered to the Summit, we will send you the login details for the Summit platform including the link to the detailed tutorial where you can informatively see how to use it via web browser & mobile application, where to find the streaming links and many more.

Definitely, every participant will have its virtual profile. You will be able to chat and agree on virtual meeting in our mobile app. Additionally, there will be networking breaks organised virtually to let participants interact live in a small groups.

FOR MORE INFORMATION CONTACT US

AlinaN.jpg

Alina Nizamtdinova

Project Director
AnnaB.jpg

Anna Beklemisheva

Project Manager

CHECK OUR LATEST FREE LEARNING SESSIONS

FEEL THE COSY ATMOSPHERE OF OUR LIVE EVENTS

Play Video

In accordance with the current EU data protection laws, please take a minute to review the term & conditions for using our services. Our terms describe how we use data and the options available to you.

Charles Pask

A well known International thought leader on Information Security issues, including Risk Management and Information Security Awareness strategies. Previously helped develop one of the earliest globally successful CBT programs for Security Awareness “For Your Eyes Only”. Has held positions on various security influencing bodies including APACS, LINK and Common Criteria.

Topic:

Darktrace

Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.

The company has over 1,300 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.

Website: www.darktrace.com
Twitter: twitter.com/Darktrace/
LinkedIn: linkedin.com/company/darktrace/

RiskRecon

RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities. RiskRecon provides the world’s easiest path to understanding and acting on third-party cyber risk, enabling security and risk teams to efficiently build scalable, third-party risk management programs for dramatically better risk outcomes. Learn more about RiskRecon, request a demo or visit the website at
www.riskrecon.com.

Twitter: https://twitter.com/riskrecon
LinkedIn: https://www.linkedin.com/company/riskrecon
Facebook: https://www.facebook.com/riskrecon/

Source Defense

Source Defense is the market leader in Client-side Security for websites, providing real-time threat detection, protection and prevention of vulnerabilities originating in JavaScript. The Source Defense patented Website Client-side Security Platform offers the most comprehensive & complete solution addressing threats and risks coming from the increased usage of JavaScript, libraries and open source in websites today.

The ADMIN management console, VICE sandboxing and WiPP data shield offerings utilize patented technology and are deployed by leading Fortune 500 enterprises in the Financial, Retail, and Healthcare markets. Headquartered in Israel, with branches across the US and a strong community of global valuable partnerships, Source Defense is the most innovative, reliable and trusted partner in the fight against client-side attacks.

Our Mission

Enabling companies to leverage their websites to drive business forward, further and faster, while ensuring security, compliance, and customer data privacy.

Website / LinkedIn / Facebook / Twitter

Cybervadis

CyberVadis is the first scalable solution for managing the full third-party cybersecurity risk assessment process. The CyberVadis platform is based on a methodology that maps to all major international compliance standards, and combines the speed of automation with the accuracy and effectiveness of a team of experts. This includes engaging vendors directly with assessments, validating results with an in-house team of security analysts, and issuing companies a standardized cybersecurity rating that they can share with others, along with a detailed improvement plan for increasing their score and the ability to collaborate with clients and vendors on implementing better practices.