www.scmagazine.com
Open in
urlscan Pro
2606:4700:20::681a:3d7
Public Scan
Submitted URL: http://www.scmagazine.com/cybercast/automations-role-in-tprm?utm_source=securityscorecard
Effective URL: https://www.scmagazine.com/cybercast/automations-role-in-tprm?utm_source=securityscorecard
Submission: On April 14 via manual from GB — Scanned from GB
Effective URL: https://www.scmagazine.com/cybercast/automations-role-in-tprm?utm_source=securityscorecard
Submission: On April 14 via manual from GB — Scanned from GB
Form analysis
1 forms found in the DOM<form class="w-100" scmag-registration="set">
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="email">Business Email</label><input name="email" placeholder="Business Email*" required="" type="email" id="email"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="password">Password</label><input name="password" placeholder="Password*" required="" type="password" id="password"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="firstName">First Name</label><input name="firstName" placeholder="First Name*" required="" type="text" id="firstName"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="lastName">Last Name</label><input name="lastName" placeholder="Last Name*" required="" type="text" id="lastName"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="companyName">Company Name</label><input name="companyName" placeholder="Company Name*" required="" type="text" id="companyName"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input name="jobTitle" placeholder="Job Title*" required="" type="text" id="jobTitle"
class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="phone">Phone</label><input name="phone" placeholder="Phone*" required="" type="text" id="phone" class="FormInput_formControl__eHBMz form-control" value=""></div>
<div class="mb-4">
<div>
<div class="Registration_checkbox__q5jP_ form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
</div>
<div>
<div class="Registration_checkbox__q5jP_ form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
about upcoming SC Media events, webcasts, and conferences.</label></div>
</div>
</div>
<div class="Terms_terms__Gys3C my-4">
<p>By clicking the Create Account button below, you agree to SC Media <a href="/terms-and-conditions" data-feathr-click-track="true">Terms and Conditions</a><span> and
</span><a href="/privacy-policy" data-feathr-click-track="true">Privacy Policy</a>.</p>
</div><button type="submit" class="btn btn-primary">Create Account</button>
</form>
Text Content
Log inRegister Topics Industry Events Podcasts Research Recognition Leadership COOKIES This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies. Accept cookies April 19 2:00 PM ET AUTOMATION’S ROLE IN TPRM Live Webcast|1 Hour It can be tough deciding how much automation you want to introduce into a particular IT security function. While automation does bring speed and efficiency, companies sometimes like to rely on human judgment for important security decisions. This debate is certainly true for third-party risk management, as companies debate if they want to use automation for things like risk prioritization or triggering a vendor reassessment or performance review in the event of an alert. In this session, we will examine the pros and cons of incorporating automation into the various elements of third-party risk management. Speakers: Parham Eftekhari Senior Vice President CyberRisk Alliance Parham Eftekhari is a business executive specializing in cyber and national security. He currently serves as a SVP at CyberRisk Alliance, leading its CISO services group the Cybersecurity Collaborative. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation's leading cybersecurity think tank which he founded in 2014. Mike Wilkes CISO SecurityScorecard Mike Wilkes is the Chief Information Security Officer (CISO) at SecurityScorecard. Wilkes is responsible for developing enterprise-wide security programs to protect corporate systems as well as growing and extending the SecurityScorecard platform to customers, executives, and boards of directors. Wilkes is a technology evangelist with experience reaching back to the earliest days of the internet and the birth of ecommerce (he and his team built, launched, and supported starbucks.com in 1998), Mike has been leading the digital transformation of globally renowned brands such as Sony Playstation, Macy's, nVidia, KLM, and many others. Chuck Burbank CISO BenefitMall Susana Hernansanz Principal Product Manager CrowdStrike Sponsored By: Log in Register Business Email Password First Name Last Name Company Name Job Title Phone Yes, I would like to receive industry news alerts, the Daily Scan, and editorial updates from SC Media. Yes, I would like to receive information about upcoming SC Media events, webcasts, and conferences. By clicking the Create Account button below, you agree to SC Media Terms and Conditions and Privacy Policy. Create Account -------------------------------------------------------------------------------- ABOUT US SC MediaCyberRisk AllianceContact UsCareersPrivacy GET INVOLVED SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us EXPLORE Product reviewsResearchWhite papersWebcastsPodcasts Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may not be published, broadcast, rewritten or redistributed in any form without prior authorization. Your use of this website constitutes acceptance of CyberRisk Alliance Privacy Policy and Terms & Conditions.