Supply Chain and Third-Party Risk
The event has already taken place, thanks for checking!
Third-party and supply chain risk are no longer a new topic. The use of cloud solutions, third party vendors, and outsourcing continue to increase, and these relationships can create risk. For organizations with thousands of vendors, managing risk can be overwhelming. But the same frameworks security teams use to assess their internal risk can also be applied to vendors. Lets’ talk about managing the genie inside the bottle.
Join Proofpoint for an informative one-hour discussion on Supply Chain and Third-party Risk. You will learn from a series of speakers who will explore this topic and discuss solutions that can help manage risk, including:
With over 20 years experience in IT working desktop, datacenter engineer, network engineer, systems engineer, and responsible for many organizations security programs, then working on the vendor side for app security (Tufin), Netflow analysis (Cisco), threat intelligence/SOAR (ThreatConnect), packet capturing (Endace), pentesting (Pentera), and now ITDR (Proofpoint/Illusive). I bring a different perspective, very well-rounded view in security.
Deborah Watson is a Resident CISO at Proofpoint with more than 20 years of experience as a cybersecurity leader focused on corporate information security strategy, compliance, security architecture, and data privacy and protection. Deborah has worked with both public and private sector organizations across the Fortune 1000 as an employee or consultant. Deborah has a Master’s degree in Information Technology Management from Harvard University and is a Doctoral Candidate in Psychology (PsyD) at California Southern University. Ms. Watson has published papers and presented on a variety of topics including GDPR, IoT, BEC and Phishing, Third-Party Risk Management, and Open Source Security.
Mike Schenck is an Advanced Technology Specialist for the Email Fraud Defense division within Proofpoint. Mike specializes in email identity deception and consults with clients to advise protections against Business Email Compromise. Throughout Mike’s career he has been able to uncover a multitude of identity deception attacks targeting organizations’ employees, business partners, and consumers.
This event is approved and endorsed by (ISC)2 and CPE credits will automatically be credited to your member account within four to six weeks.