www.scmagazine.com Open in urlscan Pro
2606:4700:20::ac43:44ea  Public Scan

Submitted URL: https://go.scmagazine.com/MTg4LVVOWi02NjAAAAGJasaAQ1RjSjWppxW8n4Vq6NuD7bEKbIuqJwUioKhn9JqzFVNYJ89ETmaVv0i3EFRLq4o4l80=
Effective URL: https://www.scmagazine.com/esummit/partner-or-problem-securing-third-party-relations-in-the-age-of-supply-chain-attacks?utm...
Submission: On January 19 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form class="w-100" scmag-registration="set">
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="email">Business Email</label><input placeholder="Business Email*" required="" type="email" id="email" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="password">Password</label><input placeholder="Password*" required="" type="password" id="password" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="firstName">First Name</label><input placeholder="First Name*" required="" type="text" id="firstName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="lastName">Last Name</label><input placeholder="Last Name*" required="" type="text" id="lastName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="companyName">Company Name</label><input placeholder="Company Name*" required="" type="text" id="companyName" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="jobTitle">Job Title</label><input placeholder="Job Title*" required="" type="text" id="jobTitle" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="my-2 font-sans"><label class="visually-hidden form-label" for="phone">Phone</label><input placeholder="Phone*" required="" type="text" id="phone" class="fs-7 text-black p-3 form-control" value=""></div>
  <div class="mb-4">
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoEditorialNewsletters" class="form-check-input"><label title="" for="ssoEditorialNewsletters" class="form-check-label">Yes, I would like to receive industry news
          alerts, the Daily Scan, and editorial updates from SC Media.</label></div>
    </div>
    <div>
      <div class="Registration_checkbox__qddY6 form-check"><input type="checkbox" id="ssoLearningNewsletters" class="form-check-input"><label title="" for="ssoLearningNewsletters" class="form-check-label">Yes, I would like to receive information
          about upcoming SC Media events, webcasts, and conferences.</label></div>
    </div>
  </div>
  <div class="fs-9 my-4">
    <p>By clicking the Create Account button below, you agree to SC Media <a class="text-underline" href="/terms-and-conditions" data-feathr-click-track="true" data-feathr-link-aids="[null]">Terms and Conditions</a><span> and
      </span><a class="text-underline" href="/privacy-policy" data-feathr-click-track="true" data-feathr-link-aids="[null]">Privacy Policy</a>.</p>
  </div><button type="submit" class="btn btn-primary">Create Account</button>
</form>

Text Content

Log inRegister
Topics
Industry
Events
Podcasts
Research
Recognition
Leadership

eSummit


PARTNER OR PROBLEM? SECURING THIRD-PARTY RELATIONS IN THE AGE OF SUPPLY CHAIN
ATTACKS 

Live Broadcast | Tuesday, Jan 24, 2023, 10:45 AM ET - Wednesday, Jan 25, 2023,
4:00 PM ET

Earn up to 6.5 CPE credits by attending this virtual event.

Regardless of how securely your data resides within your internal organization,
you are left exposed by your third-party business relationships. Upstream supply
chain partners, cloud-based service providers, third-party programming code –
these are all sources of risk. 

This eSummit will demonstrate solutions, policies and strategies that companies
can implement to ensure that third parties act as true partners, and not
problems. Topics will include: 

 * The latest exclusive research on third-party risk from the CyberRisk
   Alliance 
 * Ensuring security and compliance through all stages of the third-party
   partner lifecycle
 * Lessons learned from the latest supply-chain attacks, including the growing
   importance of SBOMs
 * Reducing the risks associated with third-party code

--------------------------------------------------------------------------------


TUESDAY, JANUARY 24TH

OPENING KEYNOTE | 11:00 AM | Ensuring your data is safe after ending a
third-party relationship

Gregory Rasner: Senior Vice President, Cybersecurity Third Party Risk, Truist

The same way you need to disable the credentials of workers who are no longer
employed by your organization, you must also ensure that you do not incur any
risk from former third-party partner companies who no longer conduct business
with you. This session will look at the important steps companies should take to
shield their data and assets from leaks and breaches once a third-party business
relationship has reached its conclusion.



--------------------------------------------------------------------------------



11:30 AM
Aligning internal cybersecurity practices with external third-party risk
management
Brad McAdams: Senior Solution Consultant, Process Unity

What does it mean to prioritize cybersecurity throughout the extended enterprise
in the modern threat landscape? Today’s organizations are protecting their
high-value assets and sensitive data from increased cyber-attacks by addressing
cybersecurity internally and externally. By aligning cybersecurity and
third-party risk management, organizations identify the vulnerabilities present
throughout the extended enterprise. This insight is crucial for organizations to
develop a robust cybersecurity strategy that helps bolster their weakest links.

Attendees will learn how to:
• Identify compliance risks, operational risks and information security risks
within your organization and vendor population.
• Develop a defined process for prioritizing, mapping and evaluating third-party
cyber risk.
• Gain a clear sense of control performance internally and externally to
prioritize remediation projects.
• Create dynamic reports on control effectiveness internally and externally to
track issues over time and stay ahead of future incidents.

--------------------------------------------------------------------------------

12:00 PM
Up-leveling security: From kill chains to supply chains
J. Wolfgang Goerlich: Advisory CISO, Cisco Secure

Organizations have long struggled to manage access, assets, threats, and
vulnerabilities. The starting point of most security guidance begins with what
we can see and what we own. While it’s been a decade since Wolfgang Goerlich
declared “ownership is not a control,” the industry has made little progress
shifting to a shared responsibility model. Today businesses compete as
ecosystems, and recent years have further shifted away from ownership towards
the supply chains. But how do we secure our suppliers? Ask questions on vendor
RFPs? Rely on attestations like SOC2 or ISO 27001? Possibly, however, the world
is full of anecdotes and data points where suppliers misunderstood or
misrepresent their security posture. Further, security organizations must create
processes to make use of that data in business and security risk decisions. In
this session, we’ll look backwards at where we’ve come, then look forwards at
where we might be headed with supply chain security. We’ll conclude with a
review of techniques for supply chain risk management and tactics for defending
what we do not own and cannot see.

--------------------------------------------------------------------------------

12:30 PM
Break

--------------------------------------------------------------------------------

1:30 PM
Going beyond zero trust and achieve zero friction
Joseph Carson: Chief Security Scientist & Advisory CISO: Delinea

Regulatory bodies, government agencies, and CIOs are mandating Zero Trust as a
cyber security framework. What does Zero Trust mean for your security strategy?
This session will describe where Zero Trust started, how it has evolved over the
years, what it really means for your organization today and what you can do to
realize the benefits.

--------------------------------------------------------------------------------

2:00 PM
Taking a strategic approach to your third-party risk management program
Richard Marcus, VP, Information Security, AuditBoard
John Volles, Director, Information Security Compliance, AuditBoard

Who has access to your company’s data and what risks do they pose to your
organization? While these questions seem basic, most organizations cannot
confidently answer them, despite an accelerating trend of third-party threats
and incidents. Building a robust third-party risk program is complex and takes
time. Building a program that allows information security teams to be strategic
in managing third-party risks is even more challenging. During this session,
AuditBoard’s Information Security team will guide you through how they
successfully transitioned to a strategic and technology-enabled third-party risk
program to manage this emerging source of risk.

--------------------------------------------------------------------------------

CLOSING KEYNOTE | 2:30 PM | Automation’s role in third-party risk management

Dustin Sachs: Senior Manager, Information Security Risk Management, World Fuel
Services

It can be tough deciding how much automation you want to introduce into a
particular IT security function. While automation does bring speed and
efficiency, companies sometimes like to rely on human judgment for important
security decisions. This debate is certainly true for third-party risk
management, as companies debate if they want to use automation to reduce the
inefficiencies and cognitive bias that can come with overly manual risk
assessments. In this session, we will examine the pros and cons of incorporating
automation into the various elements of third-party risk management, and how
such automation can be effectively applied.

--------------------------------------------------------------------------------


WEDNESDAY, JANUARY 25TH

OPENING KEYNOTE | 11:00 AM | SBOMs & the private sector: Breaking the barriers
to entry

Cassie Crossley: VP, Deputy Product Security Officer, Product & Systems Security
Office, Schneider Electric

The road to secure software and SBOM-generation runs through a massive network
of private-sector vendors and manufacturers, but these entities face a number of
daunting challenges to get there.

For example, the coordination necessary to achieve even early or intermediate
steps building out SBOMs for large product sets – such as asset inventory – are
extremely challenging and resource-intensive for many organizations. Other
obstacles like budget constraints, shadow IT, proprietary concerns and lack of
viable tooling also loom over a small set of evangelists who are attempting to
breathe life into the concept.

In this session, SC Media will speak with Cassie Crossley, VP, Deputy Product
Security Officer at Schneider Electric, who has spent years thinking through the
SBOM question and how to get from here to a safer, more secure software
ecosystem.

--------------------------------------------------------------------------------

11:30 AM
Build vs buy: Is managing customer identity slowing your time to market?
Jeremie Berthiaume: Group Product Marketing Manager, Okta
Peter Fernandez: Staff Solutions Architect, Okta

Every team building a web or mobile app faces the same dilemma with every new
piece of functionality: build in-house or use out-of-the-box services to make
the job easier and faster. And, more often than not, it starts with the
fundamental choice of how to provide for authenticated user access.

“Our developers can handle customer identity.” It’s a login box. How hard could
it be?

But customer identity is so much more than just the login box. As businesses
grow and add features, maintaining a homegrown solution is a major drain on
resources. Developer time spent on DIY identity, security and privacy compliance
is time taken away from core business innovation.

In this webinar we will discuss how dev teams can:

Lower the total cost of ownership (TCO) of application development
Reduce the risk of a security and compliance breach
Keep developers motivated and improve engineering efficiency

--------------------------------------------------------------------------------

12:00 PM
Software supply chain security risks and the need for modern AppSec
Mic McCully: Field CTO, Snyk

By 2025, 45% of organizations worldwide will have experienced attacks on their
software supply chains (Gartner) which are only becoming increasingly complex
due to the changes in how modern software is built. These trends, together with
new federal regulations, require organizations to take action to ensure the
security and integrity of their software. But this is easier said than done.

In this session, we’ll explore the software supply chain as an attack vector –
by identifying risks and mitigation strategies throughout the software
development processes and environment. We’ll also explore how AppSec programs
must evolve and adapt to the modern software development process to accommodate
software supply chain risks. Join us to learn how you can meet new requirements
and protect your software from these attacks.

--------------------------------------------------------------------------------

12:30 PM
Break

--------------------------------------------------------------------------------

THOUGHT LEADERSHIP PANEL | 12:45 PM | Are your third-party partners putting you
in crosshairs of compliance regulators?
Carter Schoenberg: Vice President, Cybersecurity & Chief Cybersecurity Officer,
SoundWay Consulting Inc.
Jennifer Sosa: Director, Consulting and Information Governance Services,
TransPerfect Legal Services

No matter how hard your organization tries to adhere to key cyber and privacy
regulations, you can still be sabotaged by the sloppy or careless actions taken
by your third-party partners. This panel session will cite, one by one, the
various regulatory bodies of authority whom you may run afoul of, if a
third-party incident or leak bleeds into your own organization

For each example, the panelists will examine the type of third-party cyber
behavior that can get you into hot water, the potential ramifications and
punishments, and strategies insulate yourself from third-party risk in that
particular area.

This way, by understanding the biggest compliance risks that businesses are
exposed to via their third parties, you can hopefully insulate yourself against
threats which many start out external, but ultimately creep their way into your
organization.

--------------------------------------------------------------------------------

1:30 PM
The right KRIs and KPIs for measuring third-party risk
Alastair Parr. Senior Vice President: Global Products & Risk at Prevalent.

Measuring risk from third parties can be complex, requiring you to translate
obscure metrics into potential business impacts. And, once you define ways to
measure risk, you still need benchmarks and standards to compare your
third-party risk management (TPRM) program’s effectiveness. It doesn’t have to
be so complicated!
In this webinar, you’ll gain practical tips for:
• Defining and implementing meaningful and actionable TPRM KPIs and KRIs
• Leveraging risk triggers to unearth your major pillars of risk
• Fostering a “collective risk management” ideology in your organization
• Evolving TPRM metrics from checklists to continuous risk management

--------------------------------------------------------------------------------

CLOSING KEYNOTE | 2:00 PM | The risks and rewards of third-party code in your
DevOps projects

Third-party code is often used as a development shortcut to achieve quick
results – but depending on the source of that code, you might just be embedding
exploitable vulnerabilities into your own budding web and mobile applications.
This webcast will look at ways you can vet, evaluate and approve third-party
code libraries before borrowing from them – offering tips and tricks to securely
incorporate someone’s code as part of your own DevSecOps practices.



*Please check back for updates to this agenda*


SPONSORS


Log in
Register
Business Email
Password
First Name
Last Name
Company Name
Job Title
Phone
Yes, I would like to receive industry news alerts, the Daily Scan, and editorial
updates from SC Media.
Yes, I would like to receive information about upcoming SC Media events,
webcasts, and conferences.

By clicking the Create Account button below, you agree to SC Media Terms and
Conditions and Privacy Policy.

Create Account

--------------------------------------------------------------------------------

ABOUT US

SC MediaCyberRisk AllianceContact UsCareersPrivacy

GET INVOLVED

SubscribeContribute/SpeakAttend an eventJoin a peer groupPartner With Us

EXPLORE

Product reviewsResearchWhite papersWebcastsPodcasts

Copyright © 2022 CyberRisk Alliance, LLC All Rights Reserved. This material may
not be published, broadcast, rewritten or redistributed in any form without
prior authorization.

Your use of this website constitutes acceptance of CyberRisk Alliance Privacy
Policy and Terms & Conditions.

COOKIES

This website uses cookies to improve your experience, provide social media
features and deliver advertising offers that are relevant to you.

If you continue without changing your settings, you consent to our use of
cookies in accordance with our privacy policy. You may disable cookies.

Accept cookies