www.scmagazine.com Open in urlscan Pro
2606:4700:20::681a:3d7  Public Scan

Submitted URL: http://www.scmagazine.com/cybercast/automations-role-in-tprm?utm_source=securityscorecard
Effective URL: https://www.scmagazine.com/cybercast/automations-role-in-tprm?utm_source=securityscorecard
Submission: On April 14 via manual from GB — Scanned from GB

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="email">Business Email</label><input name="email" placeholder="Business Email*" required="" type="email" id="email"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="password">Password</label><input name="password" placeholder="Password*" required="" type="password" id="password"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="firstName">First Name</label><input name="firstName" placeholder="First Name*" required="" type="text" id="firstName"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="lastName">Last Name</label><input name="lastName" placeholder="Last Name*" required="" type="text" id="lastName"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="companyName">Company Name</label><input name="companyName" placeholder="Company Name*" required="" type="text" id="companyName"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input name="jobTitle" placeholder="Job Title*" required="" type="text" id="jobTitle"
      class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="FormInput_formGroup__XyOdr"><label class="visually-hidden form-label" for="phone">Phone</label><input name="phone" placeholder="Phone*" required="" type="text" id="phone" class="FormInput_formControl__eHBMz form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Registration_checkbox__q5jP_ form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Registration_checkbox__q5jP_ form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
          about upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="Terms_terms__Gys3C my-4">
    <p>By clicking the Create Account button below, you agree to SC Media <a href="/terms-and-conditions" data-feathr-click-track="true">Terms and Conditions</a><span> and
      </span><a href="/privacy-policy" data-feathr-click-track="true">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Create Account</button>
</form>

Text Content

Log inRegister
Topics
Industry
Events
Podcasts
Research
Recognition
Leadership


COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies
April
19
2:00 PM ET


AUTOMATION’S ROLE IN TPRM

Live Webcast|1 Hour

It can be tough deciding how much automation you want to introduce into a
particular IT security function. While automation does bring speed and
efficiency, companies sometimes like to rely on human judgment for important
security decisions. This debate is certainly true for third-party risk
management, as companies debate if they want to use automation for things like
risk prioritization or triggering a vendor reassessment or performance review in
the event of an alert. In this session, we will examine the pros and cons of
incorporating automation into the various elements of third-party risk
management.  

Speakers:

Parham Eftekhari

Senior Vice President

CyberRisk Alliance

Parham Eftekhari is a business executive specializing in cyber and national
security. He currently serves as a SVP at CyberRisk Alliance, leading its CISO
services group the Cybersecurity Collaborative. Parham also serves as the
chairman of the Institute for Critical Infrastructure Technology (ICIT), the
nation's leading cybersecurity think tank which he founded in 2014. 

Mike Wilkes

CISO

SecurityScorecard

Mike Wilkes is the Chief Information Security Officer (CISO) at
SecurityScorecard. Wilkes is responsible for developing enterprise-wide security
programs to protect corporate systems as well as growing and extending the
SecurityScorecard platform to customers, executives, and boards of directors.
Wilkes is a technology evangelist with experience reaching back to the earliest
days of the internet and the birth of ecommerce (he and his team built,
launched, and supported starbucks.com in 1998), Mike has been leading the
digital transformation of globally renowned brands such as Sony Playstation,
Macy's, nVidia, KLM, and many others. 

Chuck Burbank

CISO

BenefitMall



Susana Hernansanz

Principal Product Manager

CrowdStrike



Sponsored By:


Log in
Register
Business Email
Password
First Name
Last Name
Company Name
Job Title
Phone
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Create Account button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Create Account

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.