Webinar
Top 5 Priorities for Third Party Cyber Risk for 2022
Cyberattacks on the supply chain have become a board-level issue for organizations and will continue to plague executives in 2022. The number and sophistication of security breaches is rising; attacks like ransomware cause significant disruptions to the supply chain, putting security at the forefront of business decisions.
In this session, we will discuss cyberattack readiness and how to ensure that business resiliency is in place for timely detection and mitigation of attacks.
Cost: Free / Credits: 1 CPE
In this session, we will discuss cyberattack readiness and how to ensure that business resiliency is in place for timely detection and mitigation of attacks.
Cost: Free / Credits: 1 CPE
Speakers:
-
Nasser FattahSenior Advisor, Shared AssessmentsNasser has 20+ years as a Cybersecurity, Supply Chain, and IT leader. With a focus on customer-first and team-building approaches, Fattah is able to align programs to support company strategies, regulatory requirements, and growth initiatives. He drives cybersecurity, supply chain, and IT as enablers for enterprise-wide transformation initiatives. He partners with executives to identify and select strategic external partners to deliver essential IT and cybersecurity services to the business. Nasser worked with global parent companies and subsidiaries to establish technology standards to maximize investments and operations efficacy to best support business needs and growth. Nasser has a strong, consistent record working successfully with Business and IT executives, regulators, auditors, and risk partners. Nasser also teaches cybersecurity at several colleges and is the chair for North America Shared Assessments – an industry best practices for the supply chain.View full bio
-
Trony CliftonCyber Third Party Governance, BNY MellonTrony has 30+ years as an IT Audit, cybersecurity, and technology leader. He is responsible for Site Assessments, PCI Compliance, and Cyber SME for Legal at the Bank. Trony is a former professor at NJIT and author of IT Audit and IT Security books.View full bio