On Demand Events

Missed a recent webinar or Member Forum Call? Catch our previous virtual sessions here. We now offer CPEs from most of our on-demand offerings. To earn CPEs, please submit your information and codes in the form linked below. Note: our on-demand recordings work best when viewed in the Chrome browser.

Webinar

Cybersecurity Taxonomy for Continuous Monitoring

Please join us as Shared Assessments, BitSight Technologies, Black Kite, Panorays, RiskRecon, SecurityScorecard, and 23Advisory LLC present the Cybersecurity Taxonomy for Continuous Monitoring, which provides the first descriptive list of cyber events and monitoring surfaces aimed to facilitate more precise and transparent communications among Security Ratings Services (SRS), vendors, suppliers, and end-user organizations. Shared Assessments is making version 1.0 available for use by all industries and third party/cyber risk practitioners.

Cost: Free / Credits: 1 CPE
Speakers:
  • Charlie Miller
    Senior Advisor, Shared Assessments
    Charlie Miller is a frequent speaker and a recognized expert in third party risk. His key responsibilities include expanding the Shared Assessments Third-Party Risk Management membership-driven program, facilitating thought leadership, industry vertical strategy groups, continuous monitoring / operational technology working groups, and loT research studies.
    View full bio
  • Demi Ben-Ari
    CTO and Co-Founder, Panorays
    Demi Ben-Ari is a software engineer, entrepreneur, and international tech speaker. He has over 10 years of experience in building various systems both from the field of near-real-time applications and big data distributed systems. - Google Developer Expert (GDE) - Google Cloud Platform. - Co-Founder of the “Big Things” Big Data community and Google Developer Group Cloud.
    View full bio
  • Candan Bolukbas
    CTO and Co-Founder, Black Kite
    Candan Bolukbas is a digital polymath and Certified Ethical Hacker. Candan fully appreciates the growing threat to digital communications and data accumulation which affects all of us. He is co-founder and chief technology officer at Black Kite, a Boston-based “security-as-a-service solutions” company. Besides being an Ethical Hacker, he is a certified secure programmer, certified incident handler, and certified computer hacking forensic investigator.
    View full bio
  • Mike Jordan
    Founder/Principal, 23Advisory LLC
    Mike Jordan is a leader in cybersecurity, third party risk, and compliance. He is passionate about bringing people together to make the right decisions for managing risk. To meet business objectives, we have to take risks. While we can’t have one without the other, we can greatly improve our chances of success by bringing the right people, processes, and technology together to effectively understand and respond to risk in a way that best fits the situation. Mike has more than 20 years in security and risk management, his experience includes designing and deploying multiple scalable and sustainable security technologies, programs, strategies, and products.
    View full bio
  • Evan Tegethoff
    VP Consulting Engineering, BitSight Technologies
    Evan Tegethoff is an information security professional focused on risk, compliance, technology, and program development. His goal is to promote the continued maturity of our industry into a discipline that holistically considers cyber security, data protection, technology, and business risk as a unified concept.
    View full bio
  • Mike Wilkes
    CISO, Security Scorecard
    Mike Wilkes is a senior security executive with broad experience designing, building, and supporting high-availability infrastructures for the financial services, energy, travel, media, and retail sectors.
    View full bio
Register to Watch

Fireside Chat – Innovations in Third Party Risk Processes

This session will be the first in a series of Fireside Chats featuring third party risk professionals sharing innovation success stories. Join Randy Sabbagh, Vice President, Global Incident Management & Third Party Resilience Oversight, State Street, who will share his experiences of how he has been able to stay ahead of the curve, what challenges he sees on the horizon for third party risk, and what needs to be done to develop the next generation of risk managers.

Cost: Free / Credits: 1 CPE
Speakers:
  • Tom Garrubba
    Senior Consultant, Shared Assessments
    Tom is an internationally recognized subject matter expert, lecturer, writer, and blogger on third-party risk, and is the head instructor for the Certified Third-Party Risk Professional (CTPRP) certification program. He is a contributor to Future of Sourcing, blogged for the Huffington Post’s Business section, and for Government Health IT, ISACA, Risk.net, and numerous eGRC websites.
    View full bio
  • Randy Sabbagh
    VP Global Incident Management, State Street
    Randy is Vice-President, Global Incident Management in State Street’s Enterprise Continuity Services where he focuses on response programs as well as supporting the firm’s 3rd Party Resilience program. Prior to returning to State Street, Randy was at Charles Schwab where his roles included Managing Mainframe Database, Systems and Network, Infrastructure Audit as well as roles including lead Engineer on Technology Resilience, developing and implementing 3rd party program resilience as well as Solutions Architect for Public Cloud implementation and data center strategy.
    View full bio
Register to Watch

Compliance Week’s Cyber Risk and Data Privacy Summit 2022

Video from Compliance Week’s Cyber Risk and Data Privacy Summit 2022.

A continuous monitoring cybersecurity strategy for third party risk management (TPRM) goes a long way toward proactively identifying vulnerabilities posed by external sources. Shared Assessments Senior Advisor Nasser Fattah and other experts share best practices for cybersecurity monitoring.

Webcast courtesy of Compliance Week.
Speakers:
  • Nasser Fattah
    Senior Advisor, Shared Assessments
  • Rudy Patel
    Head of Third Party Risk Management, Mizuho
  • Brian Peister
    Cyber and IT Third Party Risk Management Global Officer, BNY Mellon
Register to Watch

Data Governance For Third Party Risk

As regulations, industry standards, and business strategies continue to shift, data governance is becoming more difficult to support, especially with your vendors. Data governance includes setting internal standards and data policies on how data is gathered, stored, processed, and disposed. This session will provide insight from Shared Assessments experts on how to stay on top of data governance processes for third party risk with specific tips for Schrems II, GDPR, and CCPA.

Cost: Free / Credits: 1 CPE
Speakers:
  • Tom Garrubba
    Vice President, Shared Assessments
    Tom Garrubba, Vice President, is an internationally recognized subject matter expert, lecturer, writer, and blogger on third-party risk, and is the head instructor for the Certified Third-Party Risk Professional (CTPRP) certification program. He is a contributor to Future of Sourcing, blogged for the Huffington Post’s Business section, and for Government Health IT, ISACA, Risk.net, and numerous eGRC websites.
    View full bio
  • John Bree
    Chief Evangilist & Chief Risk Officer, Supply Wisdom
    John Bree is recognized as a global financial industry executive and subject matter expert with a proven track record in developing and managing Vendor & Third Party Sourcing Risk Management, AML/CTF, KYC, and Anti-Fraud programs.
    View full bio
  • Web Hull
    Privacy and Data Protection Officer, Sr Risk and Compliance Analyst, Abacus Insights
    Web Hull has a broad and deep knowledge of domestic and international laws, regulations, regulatory guidance, standards, and business practices. Known as an industry leader with deep experience and hands-on, practical expertise who guides companies as they seek solutions to domestic and international Privacy, Data Protection, InfoSec, & Compliance issues.
    View full bio
Register to Watch

Top 5 Priorities for Third Party Cyber Risk for 2022

Cyberattacks on the supply chain have become a board-level issue for organizations and will continue to plague executives in 2022. The number and sophistication of security breaches is rising; attacks like ransomware cause significant disruptions to the supply chain, putting security at the forefront of business decisions.

In this session, we will discuss cyberattack readiness and how to ensure that business resiliency is in place for timely detection and mitigation of attacks.

Cost: Free / Credits: 1 CPE
Speakers:
  • Nasser Fattah
    Senior Advisor, Shared Assessments
    Nasser has 20+ years as a Cybersecurity, Supply Chain, and IT leader. With a focus on customer-first and team-building approaches, Fattah is able to align programs to support company strategies, regulatory requirements, and growth initiatives. He drives cybersecurity, supply chain, and IT as enablers for enterprise-wide transformation initiatives. He partners with executives to identify and select strategic external partners to deliver essential IT and cybersecurity services to the business. Nasser worked with global parent companies and subsidiaries to establish technology standards to maximize investments and operations efficacy to best support business needs and growth. Nasser has a strong, consistent record working successfully with Business and IT executives, regulators, auditors, and risk partners. Nasser also teaches cybersecurity at several colleges and is the chair for North America Shared Assessments – an industry best practices for the supply chain.
    View full bio
  • Trony Clifton
    Cyber Third Party Governance, BNY Mellon
    Trony has 30+ years as an IT Audit, cybersecurity, and technology leader. He is responsible for Site Assessments, PCI Compliance, and Cyber SME for Legal at the Bank. Trony is a former professor at NJIT and author of IT Audit and IT Security books.
    View full bio
Register to Watch

Set the Right KPIs and KRIs for your Program

As Risk Management has developed into a central business issue, senior management has become interested in understanding the risk environment.

In this session, we will cover what metrics reveal about the health of your vendor risk management program and how they can be used to build a risk-aware culture.

What risk metrics best tell the story of your risk management program’s performance to the board, C-Suite and other key stakeholders?

Cost: Free / Credits: 1 CPE
Speakers:
  • Ron Bradley
    Vice President, Shared Assessments
    Ron Bradley has been involved with Shared Assessments in some capacity for over 15 years. With a depth of experience building TPRM programs in financial services (Bank of America) and manufacturing (Reynolds, Trane Technologies), Ron understands how cultures and organizations drive the supply chain and third-party process. As Vice President, Ron strives to use his extensive knowledge of Third-Party Risk Management to help organizations build programs that realize the full potential of the Shared Assessments toolkit.
    View full bio
  • Philip Bennett
    Manager, Information Security Governance, Horizontal Services, Navy Federal Credit Union
    Philip Bennett has 15 years of experience in third party cyber risk management at top financial institutions. Some of his latest works include oversight of global assessments, assessment content, and the controls testing approach strategy. He is also the Chair of the 2022 Shared Assessments Steering Committee.
    View full bio
  • Rudy Patel
    Head of Third Party Risk Management, Mizuho
    Rudy Patel is an Information Systems Security professional with experience in multiple domains of Information Technology. His most recent work focuses on the establishment of an IT Risk Management function including IT risk assessments of third parties.
    View full bio
Register to Watch

Fireside Chat: The Log4j Grinch Before Christmas

The recent Log4j vulnerability has taken on the role of the Grinch, leaving the world spinning before the holidays. This fireside chat, led by industry security professionals, will feature a discussion of the looming risk the Log4j vulnerability poses to your organization and susceptible third parties and how you can assess your internal attack surface.

The session will answer the most pressing questions of “What is Log4j?” “What does it mean to me and my team?” “How should I bring this up to my vendors?”, and most importantly, “What should we do next?”

Cost: Free / Credits: 1 CPE
Speakers:
  • Dan Desko
    CEO & Managing Partner, Echelon
    Dan currently serves as CEO & Managing Partner of Echelon. With his talented colleagues, Dan has the pleasure of building and leading a team of Cybersecurity, Privacy and IT Risk Professionals that serve the business community through a number of several specialized services
    View full bio
  • Paul Poh
    Managing Partner, Radical Security
    Paul Poh, CISSP, CISM, CRISC is Managing Partner at Radical Security. Paul has over 25 years of technology and information security experience. Prior to Radical Security, Paul was Chief Technology Officer for a leading security ratings platform where he led multiple technology teams in building and scaling a platform that could instantaneously rate the cybersecurity posture of any company world-wide. With a background in both large Fortune 500 organizations and small successful startups, Paul was also head of information security and software architecture at the largest separately managed account processor in North America where he was responsible for the protection of over a trillion dollars in assets. He joined the account processor with the acquisition of a small highly successful provider of advanced wealth management trading tools where he designed the company’s software as a service offering. An early innovator, Paul was co-founder for a managed security services provider. He fondly recalls those years where he designed a proprietary client-server solution for remote management of an intrusion detection appliance while simultaneously implementing the 24×7 operations plan. As a regular contributor to the third-party community, Paul is a recognized leader in the educational development of third-party risk assessors. He also provides advisory CISO services for several public and private companies.
    View full bio
  • Matthew Shelton
    Director, Technology Risk and Threat Intelligence at Mandiant
    Matt Shelton is a Security Technologist with over 20 years of professional experience working in capability development, threat intelligence, security architecture, security operations, risk management and threat hunting. In current his role, he leads an intelligence-driven risk management program responsible for identifying technology risk at FireEye, prioritizing risk based on adversary intentions and capabilities, and then working with business partners around FireEye to ensure the correct mitigations are in place. As a passionate student and practitioner of cybersecurity, Mr. Shelton has spent his career advising commercial, government, and military clients on how to build intelligence-led security programs.
    View full bio
Register to Watch

The 5 Most Important KRIs and KPIs to Effectively Manage Your TPRM Program

Implementing key performance indicators (KPIs) and key risk indicators (KRIs) that are meaningful to leadership and the board – as well as truly actionable – are the backbone of a successful third party risk management (TPRM) program. However, defining and gathering these measurements has long been a complex task requiring you to manually collect and translate obscure metrics into potential business impacts and risk. How can metrics be better defined and communicated without all of the manual work?

We will explore the do’s and don’ts of KRI/KPI definitions for third party management and visit the top 5 most important KRIs and KPIs to help your team get a grasp of your third party estate. Learn how to demonstrate program success with KRIs/KPIs, how to avoid misrepresenting broader third party risk, and how to present metrics in a way stakeholders value.
Speakers:
  • Alastair Parr
    SVP, Global Products & Risk, Prevalent
    Alastair Parr is responsible for ensuring that the demands of the market space are considered and applied innovatively within the Prevalent portfolio. He joined Prevalent from 3GRC, where he served as one of the founders, and was responsible for and instrumental in defining products and services. He comes from a governance, risk and compliance background; developing and driving solutions to the ever-complex risk management space. He brings over 12 years’ experience in product management, consultancy and operations deliverables.
    View full bio
  • Tom Garrubba
    Vice President, Shared Assessments
    Tom Garrubba, Vice President, is an internationally recognized subject matter expert, lecturer, writer, and blogger on third-party risk, and is the head instructor for the Certified Third-Party Risk Professional (CTPRP) certification program. He is a contributor to Future of Sourcing, blogged for the Huffington Post’s Business section, and for Government Health IT, ISACA, Risk.net, and numerous eGRC websites.
    View full bio
Register to Watch

Threat Briefing: Real-world Cyberattacks on the Supply Chain

Cybersecurity and third party risk professionals are growing increasingly concerned over the risk cyber attacks pose to supply chains. The fallout from a single attack on a supplier triggers a chain reaction impacting the entire network of providers leading to downtime of systems, monetary loss, and reputational damage. This session will impart strategies for mitigating the risk these devastating attacks pose to your organization.
Speakers:
  • Mike Jackson
    Cybersecurity Advisor (CSA), Cybersecurity and Infrastructure Security Agency (CISA)
    Mike Jackson is a Cybersecurity Advisor with the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency. Mr. Jackson is responsible for supporting the CISA mission of establishing and maintaining cybersecurity resilience for private and public critical infrastructure partners in the State of Oklahoma. His duties include conducting detailed management level assessments including Cybersecurity Resilience Reviews and External Dependency Management assessments. Mike Jackson is an Army veteran with extensive background and education in IT and cybersecurity.
    View full bio
  • Nasser Fattah
    Senior Adviser, Shared Assessments
    Nasser Fattah has 20+ years as a Cybersecurity, Supply Chain and IT leader. With a focus on customer-first and team building approaches, Fattah is able to align programs to support company strategies, regulatory requirements, and growth initiatives. He drives cybersecurity, supply chain and IT as enablers for enterprise-wide transformation initiatives. Nasser has a strong, consistent record working successfully with Business and IT executives, regulators, auditors, and risk partners. Nasser also teaches cybersecurity at several colleges, and is the chair for North America Shared Assessments – an industry best practices for supply chain.
    View full bio
Register to Watch

New 2022 Toolkit: Standardized Excellence to Meet Today’s Risk Environment

Shared Assessments has updated and upgraded the 2022 Third Party Risk Management Toolkit to align with a changing regulatory and threat environment. Content has been adjusted to focus on Cybersecurity, Data Governance, Operational Risk, and Resilience. This session includes full details about updates and upgrades to the SIG, SCA, VRMMM, Data Governance Tools, including content organization and updates to industry and regulatory standards.

Cost: Free / Credits: 1.5 CPE
Speakers:
  • Christopher Campbell
    Manager, Sales, Shared Assessments
    Christopher directly supports Shared Assessments Senior Vice President of Sales, where his key responsibilities are member service, market research, program development, prospective member outreach and membership renewals. Christopher has more than 17 years of experience in sales, customer relations and corporate operations.
    View full bio
Register to Watch
1 5 6 7 8 9