Tuesday, July 23, 2024 | |||
---|---|---|---|
Introduction to the day ahead and fireside chat | Bill Brenner - CyberRisk Alliance Adrian Sanabria - CyberRisk Alliance | ||
Breakout Session | Best Practices for Threat and Vulnerability Response and Emergency Assessments | It's not getting any easier. Every time we turn around there seems to be another attack or threat that demands our attention. While each event is unique, they all result in third-party risk management teams scrambling to ensure their organizations are protected. Rapid responses and emergency assessments can be knee-jerk, stressful and distracting. It doesn't have to be that way. | Sophia Corsetti - ProcessUnity | |
Breakout Session | TruOps, LLC | Cyber Risk Management Solutions | Today, organizations are most likely utilizing hundreds of applications and the increasing majority are predominantly browser based: The browser is a universal access client, the application of choice. | Negin Aminian - Menlo Security | |
Breakout Session | Reducing Silos Between Developers and AppSec in Your Software Supply Chain | For developer and AppSec teams alike, securing critical components of the software supply chain, including open source libraries, container images, and developer tools, is increasingly essential. However, tracking direct and indirect dependencies, finding, and fixing vulnerabilities can still be siloed. Unified tools and processes exist, providing developers and security teams access to the same security insights, however many organizations have not adopted fundamental dev-centric security tooling. To effectively manage and mitigate supply chain risk a more holistic approach is needed. Join us for this session where we will discuss: An overview of the software supply chain
| Jamie Smith - Snyk | |
Panel Discussion | Navigating the third-party security landscape: Strategies to mitigate risks and safeguard data | In today's interconnected business ecosystem, collaborating with third-party vendors and partners is essential for growth and efficiency. However, this collaboration also introduces significant security risks, ranging from data breaches to compliance violations. This panel discussion will bring together industry experts to explore effective strategies for reducing security risks when working with third parties. Topics will include best practices for vendor assessment and selection, establishing robust contractual agreements, implementing monitoring and auditing mechanisms, and fostering a culture of security awareness across organizations. | Mea Clift - Liberty Mutual Steven Fox Adrian Sanabria - CyberRisk Alliance Dave Stapleton - ProcessUnity | |
Workshop | Third-Party Risk: Strategies for its Mitigation and How Censys Can Help | Globalization and the rise of business processing outsourcing (BPO) have significantly increased the complexity of supply chains, both physical and digital. This has led to the emergence of third- and fourth-party supplier relationships, expanding attack surfaces and diminishing control over downstream governance levels. Threat actors exploit these vulnerabilities, targeting weaker links to infiltrate larger, more secure organizations. | Celestine Jahren - Censys | |
CRA Business Intelligence study takeaways: Third-party Risk | Explore the intricate domain of third-party risk management alongside CRA Business Intelligence producers Bill Brenner and Paul Wagenseil. Gain valuable insights into the challenges and triumphs faced by security teams in mitigating third-party risks, examine the strategies employed to safeguard against potential breaches, and learn about the planned investments earmarked for bolstering third-party risk management practices in the approaching year. | Bill Brenner - CyberRisk Alliance Paul Wagenseil - CyberRisk Alliance |