Richard
Stiennon
CYBERSYMPOSIUMS
&
Leading security and TPRM experts unpack how cybersecurity drives third‑party risk management—from risk‑based vendor tiers, SBOMs and continuous monitoring to contract clauses, incident notification and offboarding controls, with real‑world examples and board‑ready metrics. Attendees will get practical strategies—AI‑assisted data‑first assessments, targeted questionnaires, tabletop readiness exercises and vendor collaboration tips—to reduce exposure, speed response and build resilient supply chains.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
Join industry leaders as they map today’s third‑party risk landscape—covering software supply‑chain attacks, SBOM challenges, questionnaire fatigue and the double‑edged role of AI in scaling risk assessment and vendor monitoring. Learn practical strategies—risk‑based questionnaires, vendor tabletop exercises, resilience planning and automation with human oversight—to boost visibility, manage unknowns and turn vendor relationships into security assets before the next breach.
Jad Boutros explains how TerraTrue enables you to map your build against GDPR, CCPA/CPRA, and your own privacy rules to enable you to identify risks, spot privacy issues, and offer guidance to product teams —in real time.
This demo shows how Risk Ledger’s third-party risk management platform provides a dynamic network model, instant gateway to a world of trusted suppliers, and an adaptive risk insight framework.
This demo shows how Black Kite’s platform utilizes a combination of threat, business and risk information to provide cyber risk intelligence that goes beyond a simple risk score or rating
BACK TO TOP


