THIRD PARTY AND CYBER RISK MANAGEMENT 

Sessions in this track are focused on the ongoing process of discovering, correcting, and preventing security problems, and implanting plans to address future risks.

Topics include:
  • Business impact analysis (vulnerability scan, dependencies)
  • 3rd party risk + supply chain
  • Penetration testing (social engineering, infrastructure, whitebox, blackbox)
  • Data control risk assessment (data flow map)
  • Cyber insurance
  • Crisis management
  • Risk appetite