Learn from your peers and ensure the most effective cyber risk management approach towards your suppliers.
Learn the latest case studies on the end-to-end cyber security implementation practices when working with third parties to ensure a truly resilient and secure supply chain network at the Third Party & Supply Chain Cyber Security Summit.
Led by 30+ TOP Information Security professionals from leading companies, the discussion will allow you to see the issue from the perspective of different industries & angles and identify the complex solution to implement in your company.
Join us in Spain and build your end-to-end strategy!
Up to date
industry insights
Take a chance to discuss the latest industry news and case studies with your peers face-to-face.
Quality networking
with your industry peers
Develop long-lasting relationships and get support from the community.
The best experts
from all over the world
Surround yourself with people who are eager to learn and grow professionally.
Health and safety
are a priority
All appropriate measures are ensured according to the local government directives.
TOP destinations
for you to explore
Enjoy travelling and enrich yourself with the new city vibes.
Head of Enterprise Security & Risk Management
Vice President of Security
CISO
Head of Product Cyber Resilience
Global CISO
Director, Supplier Cyber Security Risk & Assurance
VP of Informacion Security GRC
Director of IT GRC & Cyber Security Services
NED / Board Member/ Consultant / CiSO/ CRO / CSO
Director, Supply Chain Cybersecurity
Head of Cyber TPRM
TPRM Principal
Lead Information Security Analyst
Head of TPRM
Cyber Security Contract Manager
Head of Internal Audit
GCISO
FH-Assistant Professor
Assistant Professor
Threat Intelligence Lead
CIO
Co-Chair
Head of Third Party Cyber Risk Management
Cyber Security Manager
CISO Americas
Global CISO
Manging Director
CISO UK & Ireland
VP Group Cybersecurity
Director
CISO
CEO
Group Chief Information & Digitial Transformation Officer
CISO
CISO
VP of Supply Chain Risk Management
Senior Director, Global Solutions Architects
CISO & DPO
Key Accounts Director
Head of Group Information Security GRC & Program
Director
CISO
Nothing can replace the value of dozens of brightest minds gathering and exchanging knowledge and ideas together. Check our previous events gallery and feel that atmosphere of cosy networking and meaningful connections.
Join us to make yours!
The registration is available online here. On the registration page, you can also check early bird and standard registration rates. If you would like to pay via bank transfer, please contact us at [email protected] and we will advise you on further steps shortly.
The standard delegate pass includes all physical & online conference materials, coffee breaks with snacks, hot lunches, and cocktail reception. Please note that accommodation is not included in the registration fee and must be booked separately. Contact us at [email protected] for the conference hotel discounted rates for our group.
Yes, we are delighted to provide the groups of 3 and more participants with a discount. The more people you bring, the bigger is your discount!
Absolutely! Contact us at [email protected] with your request and we will provide you with more details.
In case you would like to cancel your participation for some unexpected eventualities, such requests must be submitted in written form and sent by post or email four weeks prior to the event in order to obtain a full credit note for any future event organised by GIA Global Group s.r.o. The fees charged are strictly nonrefundable.
In the event that GIA Global Group s.r.o. cancels the conference, delegate payments at the date of cancellation will be refunded in full. In the event that GIA Global Group s.r.o. postpones a conference, delegate payments will be credited towards the rescheduled date.
Yes, places within a company are transferable without any charge. In order to do so, please notify us in advance at [email protected]
You can express your interest to speak at the Summit by submitting the form here.
You can check more details on the partnership opportunities here.
Please check our events Safety Protocol here.
Although the participation in-person gives you much more opportunities in terms of learning & networking, we do realise that not everyone can join us live. That is why we provide an option to attend the Summit virtually for a reduced registration rate. The virtual pass includes access to the event platform where you can watch main agenda presentations, check exhibition area, connect and chat with participants. For more details please contacts us at [email protected]
Subscribe to our newsletter for the latest Summit news and get a discount
Supplier Shield provides advisory, managed service, and a clever platform to help you manage third-party risks in an ever-growing regulatory environment. We help organizations to comply with NIS2, DORA, GDPR, and other regulations (FINMA for Swiss). Most organizations may lack the time, resources, or expertise to keep up. That’s where Supplier Shield comes in, the end-to-end, simplified TPRM solution:
• The right process. Our advisors can ensure your business aligns with NIS2, DORA, GDPR, FINMA, and ESG, helping you create a clear, structured third-party risk framework.
• Resources. Get auditors, cybersecurity specialists, and compliance officers to assess your suppliers and help on the TPRM program. Our resources are available within Supplier Shield and through our partners’ network.
• Supplier mapping. Our cloud platform strives to keep things simple and user-friendly with an interface that tracks supplier risks, and monitor compliance and incidents continuously. Supplier Shield, a brand of Abilene Advisors S.A., a Swiss-based group
Cybersecurity Advisors Network (CyAN) is an international platform of advisors in cybersecurity, privacy, cyber law, cyber forensics, cyber mental health and trust & safety. The ambition is to strengthen the security and safety in the digital environment through a multi-disciplinary approach based on mutual trust and on complementarity of profiles and experiences of its global members.
Fortress is the AI-powered cybersecurity company, defending critical infrastructure, government agencies, and their supply chains against cyber threats and mission risks. We know the security and stability of our energy and utilities infrastructure is absolutely critical to sustaining our economy. We know our nation’s defenders deserve the best tools in hand to safeguard our way of life. Understanding third-party risk, illuminating, and resolving vulnerabilities, and ensuring safe operation – these are the challenges we set out to solve. It’s Absolutely Critical.
The International TPRM Alliance is your global gateway to excellence in third-party and supply-chain risk management. As the first community-driven organization based in the EMEA and JAPAC regions, we are dedicated to empowering TPRM professionals and organizations worldwide. Whether you are here to enhance your professional skills, stay updated on industry trends, or connect with fellow TPRM experts, our platform offers everything you need to succeed in the evolving world of risk management. The International TPRM Alliance, formerly the TPRM-with-Yedhu WhatsApp group, was founded in July 2020 with a mission to support TPRM professionals impacted by the COVID-19 pandemic. What began as a small group of five members has grown into a global network of over 150 TPRM experts dedicated to advancing the field of Third Party and Supply Chain Risk Management. We are the first TPRM Community Development organization based out of the EMEA and JAPAC regions, committed to fostering a collaborative environment where TPRM professionals can learn, grow, and lead. Our initiatives include hosting monthly virtual roundtables, organizing an annual TPRM summit, and providing a comprehensive resource database for our members.
ProcessUnity is the Third-Party Risk Management (TPRM) company. Our software platforms and data services protect customers from cybersecurity threats, breaches, and outages that originate from their evergrowing ecosystem of business partners. By combining the world’s largest third-party risk data exchange, the leading TPRM workflow platform, and powerful artificial intelligence, ProcessUnity extends third-party risk, procurement, and cybersecurity teams so they can cover their entire vendor portfolio. With ProcessUnity, organizations of all sizes reduce assessment work while improving quality, securing intellectual property and customer data so business operations continue to operate uninterrupted. See how at www.processunity.com
SecurityScorecard provides teams with a complete understanding of their attack surface and business ecosystem risk—including partners, contractors, third- and fourth-party vendors, and supply chain. As the industry leader in security ratings, SecurityScorecard is uniquely trusted to quantify risk, quickly respond to cyber-risks, and strengthen cyber defenses.
Bitsight is the global leader in cyber risk intelligence, helping teams make informed risk decisions with the industry’s most extensive external security data and analytics. With 3,300 customers and 65,000 organizations active on its platform, Bitsight delivers real-time visibility into cyber risk and threat exposure—enabling teams to quickly identify vulnerabilities, detect threats, prioritize actions, and mitigate risk across their extended attack surface.
Built on over a decade of market-leading innovation, an unparalleled cyber dataset, and intelligence-driven workflows, Bitsight uncovers security gaps across infrastructure, cloud environments, identities, and third- and fourth-party ecosystems. From security operations and GRC teams to the boardroom, Bitsight provides the unified intelligence backbone organizations need to proactively address exposures before they impact performance.
For more information, visit bitsight.com, read our blog, or connect with us on LinkedIn.
Shared Assessments is a global membership organization dedicated to developing the best practices, education and tools to drive third party risk assurance. We are creators of the industry standard third party risk toolkit, used by over 15,000 organizations worldwide.
CyberVadis provides enterprises with a cost-effective and scalable solution for third-party cybersecurity risk assessments. Our methodology maps to all major international compliance standards including NIST, ISO 27001, GDPR, and many other privacy and security laws. CyberVadis’ solution combines the speed of automation with the accuracy and effectiveness of a team of experts. We directly engage vendors from all over the world with assessments, validate results with an in-house team of security analysts, and issue companies a standardized cybersecurity rating that they can share with others, along with a detailed improvement plan for increasing their score and the ability to collaborate with clients on implementing better practices.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | Google Analytics: Registers a unique ID that is used to generate statistical data on how the visitor uses the website. |
_gat | When you close your browser | Google Analytics: Used by Google Analytics to throttle the request rate. |
_gid | When you close your browser | Google Analytics: Registers a unique ID that is used to generate statistical data on how the visitor uses the website. |
collect | When you close your browser | Google Analytics: Used to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels. |
These cookies are used to deliver advertising materials relevant to you and your interests. They are also used to limit the number of times you see an advertisement as well as help measure the effectiveness of campaigns. They are usually placed by advertising networks we work with with our permission. They remember that you have visited a website and this information is shared with other organizations such as advertisers.
Cookie | Duration | Description |
---|---|---|
fr | 3 months | Used by Facebook to deliver a series of advertisement products such as real-time bidding from third-party advertisers |
tr | When you close your browser | Used by Facebook to deliver a series of advertisement products such as real-time bidding from third-party advertisers |