Organizations are overwhelmed with the influx of application vulnerabilities (CVEs) and indicators of compromise, yet many lack the necessary resources to thoroughly investigate even a fraction of these alerts. It's imperative that organizations optimize their approach to mitigating emerging threats from their third parties.

In this Remote Sessions webcast, you will learn:

•  Strategies to prioritize your third-party portfolio for further investigation for an emerging threat
•  How to identify the key risk factors crucial for prioritization—empowering participants to make informed decisions swiftly
•  The art of strategic vendor communication
•  How to build and maintain stakeholder and business leader confidence

Be sure to submit your questions for our presenter in the box when you register. Attendees are eligible to receive 1 CPE credit.

Generously supported by:

supported by logo
Speakers
speaker photo
Gary Phipps
VP, Strategy, ProcessUnity

Gary brings more than two decades of expertise in supporting program design for security, risk management, and regulatory compliance across diverse industries such as finance, defense, and energy. Before his tenure at ProcessUnity, Gary served as an advisor to many Fortune 500 institutions and the DoD, on effective adherence to imminent regulation.

Moderator
speaker photo
Tom Bechtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.