GRF 2021 Virtual Summit on
Security & Third-Party Risk
Networking and Education on Critical Third-Party and Supply Chain Security Issues, for Mutual Resilience Against Cyber and Geopolitical Threats
Sessions covered risk and vendor management, cybersecurity, intelligence sharing, geopolitical threat mitigation, and emerging compliance/regulation
Speakers & Topics
-
Allan Alford
CISO & CTO
TrustMAPPRansomware Readiness: What Not To Do
Chris Richter and Allan Alford share horror stories about organizations that have made terrible mistakes in defending against, and recovering from, ransomware attacks. (We won’t name and shame!) We hope to get the audience laughing at the foolishness, but to also reflect on how their ransomware readiness could be improved.
-
Vince Arneja
Chief Product Officer
GrammaTechDigital Supply Chain Threats – Prevent Vulnerabilities in your Software
Software is eating the world is a common refrain describing the oversized influence software has in how we run our businesses. From WFH initiatives, digital transformation to application development demands, third party software usage is on the rise. A recent study has shown that 100% of the most popular software contains highly vulnerable components. The challenge is how do you proactively uncover, manage and reduce the inherent risk that this code introduces.
New products have emerged which prevent this risk by analyzing this COTS or 3rd party code, for vulnerabilities while creating a SBOM (software bill of materials).
-
Colin Blumer
Integrations Manager
CywareMaturing Security Operations in a Remote World
In the past two years, the world rapidly transitioned from physical work to remote and hybrid environments. The shift was inevitable, but as organizations continue to catch up, security operations need effective strategies and solutions for meeting these new requirements. In the past, fusion centers enabled law enforcement, military, and security teams to reach their full potential by unifying people, processes, and technology under one roof; and today, cyber fusion centers are doing the same but with both cloud infrastructure and remote teams as a primary element. By tapping into emerging technologies like AI and machine learning, augmenting existing security tools and consolidating them, and bringing humans up to machine speed, cyber fusion centers are becoming the future of security operations. During this brief chat, we’ll offer a primer on how and why a cyber fusion center is the future of the SOC. Key Takeaways: 1. Why and how SOCs unify their people, processes, and technology 2. Finding a balance between human intelligence and machine speed/automation 3. Using a data-driven approach to threat intelligence
-
Andrew Bochman
Senior Grid Strategist
Idaho National LaboratoryConsequence Driven Resilience: Utility Perspectives on Accommodating Cyber, Climate and Systemic Risk
Organizations of all shapes and sizes, including electric utilities and their stakeholders, are wrestling with the proper balance of consequence, likelihood, and prioritization in the face of an increasing array of risks and threats, whether natural or manmade, which can come at any time and in combination. In a fireside chat format, Andy Bochman and Sam Rozenberg will discuss how organizations large and small are seeking this balance while approaching resilience challenges by examining current case studies that show the importance of a risk-based approach to resilience.
-
Michelle Cross
Vice President, Business Continuity Center of Excellence
FidelityAre your vendors your weakest link?
Understanding third party vendor risk is essential for organizational resiliency. This session will address best practices for assessing vendor risk and resiliency, understanding inherent risks and potential impacts to the organization, and tying vendor risk into a comprehensive resiliency program.
-
Jonathan Dambrot
Principal
KPMG Cyber Security ServicesOpening Keynote: Future of Third Party and Supply Chain Security
-
Neal Dennis
Threat Intelligence Specialist
CywareMaturing Security Operations in a Remote World
In the past two years, the world rapidly transitioned from physical work to remote and hybrid environments. The shift was inevitable, but as organizations continue to catch up, security operations need effective strategies and solutions for meeting these new requirements. In the past, fusion centers enabled law enforcement, military, and security teams to reach their full potential by unifying people, processes, and technology under one roof; and today, cyber fusion centers are doing the same but with both cloud infrastructure and remote teams as a primary element. By tapping into emerging technologies like AI and machine learning, augmenting existing security tools and consolidating them, and bringing humans up to machine speed, cyber fusion centers are becoming the future of security operations. During this brief chat, we’ll offer a primer on how and why a cyber fusion center is the future of the SOC. Key Takeaways: 1. Why and how SOCs unify their people, processes, and technology 2. Finding a balance between human intelligence and machine speed/automation 3. Using a data-driven approach to threat intelligence
-
Jonathan Ehret
Vice President, Strategy & Risk
RiskReconMeasuring the Impact of Supply Chain Risk
Organizations of all shapes and sizes are critically dependent on complex supply chains. Traditional methods of managing third-party risk simply do not provide the timely, accurate information necessary to scale at business speed.
To gain complete visibility into threats coming from your digital supply chain, you need a holistic view that provides you with real-time, actionable intelligence that allows you to focus on the risk that matters most to your business.
Attendees will learn: How recent supply chain events have shifted the mindset of executives and board members; What data points are critical to measuring the effectiveness of a supply chain risk management; The methods that the most well-built third-party risk programs are utilizing to combat supply chain threats.
-
Julie Gaiaschi
CEO & Co-Founder
Third Party Risk AssociationRegulatory Developments and the Impact on Third Party Risk Management
Regulatory compliance has been a stable item on many board agendas but lately it has been the number one topic within organizations. There are a variety of reasons behind this focus but the main drivers are related to the threat landscape growing in complexity, momentum of digital transformation, political and social unrest, as well as a global pandemic.
But what does this mean from a third party risk perspective? In this session we will explore regulations that you need to be aware of, as well as how to incorporate regulatory compliance reviews into your third party risk assessments. We will also discuss why you should be ensuring your third parties have strong regulatory compliance controls in place and the impact it could have on your organization if they do not.
-
Tom Garrubba
Vice President
Shared AssessmentsReturning to Normalcy with your Third Party Assessment Program
As normalcy returns, there is a tendency to go back to the way things used to be. In this session, we will cover the adjustments that organizations have made in the assessment process as they and their vendors pivot between their original business environment, to a work from home environment, and then back again. Third party risk management programs are frequently scrutinized for value and returning to onsite assessments is just one of the efforts under the microscope. Along with newly streamlined assessment efforts such as continuous monitoring and partnerships with other 2LD organizations, we will share with attendees what our members and research have advised us of the common success and challenges for the current environment. As we return to normalcy, it’s important to be fluid in your efforts as being flexible is now too rigid.
-
Greg Gist
Director of Cyber, Cloud and Operational Risk
Promontory Financial GroupEffective Third-Party Risk Management
This session will help companies build and/or maintain a third-party risk management function given the sweeping changes in technology, regulatory guidance and risk management practices. An end-to-end view of the third-party risk management function will be discussed. There is no cookie-cutter approach as each solution requires customization to the company.
-
John Grim
Head of Research, Development, & Innovation
Verizon Threat Research Advisory CenterVERIS A4 Threat Modeling
VERIS, the Vocabulary for Event Recording and Incident Sharing, is a set of metrics designed to provide a common language for describing cybersecurity incidents (and data breaches) in a structured and repeatable manner. VERIS provides cyber defenders and intelligence practitioners with the ability to collect and share useful incident-related information - anonymously and responsibly – with others. VERIS underpins the annual Data Breach Investigations Report. VERIS and its A4 Threat Model – Actors, Actions, Assets, Attributes – help codify incident-related information for threat modeling, intelligence analysis, breach mitigation, and detection / response improvement. Key takeaways for this session include: • Understanding cybersecurity incidents through the VERIS lens • Recognizing the VERIS A4 Threat Model: Actors, Actions, Assets, Attributes • Getting started in Threat Modeling with VERIS
-
William Hagestad
Cyber Threat Intelligence Analyst
MedtronicMethodology for Actionable, Effective Threat Intel Combining All Aspects Intelligence for Success from a Medical Device Manufacturer
During this presentation attendees will receive firsthand field experience-based lessons for building an effective cyber threat intelligence program, combining all aspects of cyber threat intelligence, OSINT, SOCMINT, HUMINT, SIGNINT, etc to respond to asymmetric threats confidently.
Discussed items include challenges, issues and actionable capabilities in building a CTI program and future proofing your manufacturing capability from the unknown vagaries of vulnerability disclosures.
-
Ram Hegde
CISO
GenpactReflections on Navigating a Cloud Journey
Genpact, a professional services firm with over 90,000 employees, has been on a multi-year journey of adopting cloud across SaaS and IaaS. They have been early adopters of solutions like CASB and Cloud Security Monitoring.
Join them in this session to hear them share lessons learnt in their journey, and a practitioner perspective in deploying best practices.
-
Andy Keiser
Principal
Navigators GlobalSupply Chain Security: Where the Global Policymaking Community is Heading
In the wake of the COVID-19 pandemic, businesses began re-examining their supply chains. Relatedly, nations around the world began re-examining their bilateral relationship with China - policymakers took a hard look at the national and economic security risk of reliance on untrustworthy partners for critical components in key industries and technologies such as telecommunications infrastructure, semiconductors, software applications, cameras, drones, computers and mobile devices. And they are considering industrial policy to support the domestic capacity of these and related industries.
This session will provide an overview of those supply chain security efforts in global capitals, and where things go from here.
-
Tom Kellermann
Member
U.S. Secret Service Cyber Investigations Advisory BoardAmerica’s Cyberinsurgency
The cybercrime cartels have become dramatically more sophisticated in 2021. This presentation will highlight significant shifts in the modern kill chain. Adversaries are now expanding upon their core capabilities with more modular and extensive malware, allowing for more diversity in their overall operations and becoming much more brazen as a result, shifting tradecraft towards more destructive attacks combined with outright sale of direct access into corporate networks. Burglary has escalated to home invasion as “island hopping” abounds. These are just a few of the trends related to cybercrime cartels, many of which are treated as national assets. Kellermann will depict the threat actors’ latest techniques, tips for defending against them, and what to expect as these actors continue to evolve. The presentation will highlight a proactive defensive paradigm named Intrusion Suppression to mitigate cyber escalation.
-
Rohit Kohli
Cloud Security Leader
GenpactReflections on Navigating a Cloud Journey
Genpact, a professional services firm with over 90,000 employees, has been on a multi-year journey of adopting cloud across SaaS and IaaS. They have been early adopters of solutions like CASB and Cloud Security Monitoring. Join them in this session to hear them share lessons learnt in their journey, and a practitioner perspective in deploying best practices.
-
Ajoy Kumar
Head of Cyber/Tech Risk
DTCCValue from Enterprise Cyber Risk Assessment
Given the critical nature of cyber security to the overall functioning of an organization, Financial Services Organizations (FSOs) are starting to measure and manage cyber risk as one of the critical risks in their overall risk portfolio. While FSOs are starting to gain an understanding of their cyber risk across the entire business franchise, understanding the cyber risk landscape at an individual Line of Business (LOB) level has remained elusive. The DTCC Enterprise Cyber Risk Assessment (ECRA) enables each LOB to understand the cyber security risk portfolio that pertains to each LOB. The methodology for identifying LOB cyber risks includes analyzing prior cyber risk assessments, incidents, and issues and threats across the enterprise and deriving the LOB specific view based on the business context, threat landscape, and technology footprint. The approach includes a bottoms up analysis of data, and a top down validation of the risks with the LOB. Once cyber risks are included in the business risk portfolio, LOBs are able to extend their existing business and operational risk management practices to cyber risk management, and take a holistic risk management approach across the entire risk portfolio.
-
Doug Levin
National Director
K12 SIXMaturing a Startup Security Program
Doug Levin, executive director of K12 SIX, takes lessons learned in the heavily attacked and under-resourced education sector and offers them for implementation in new or growing security programs, in any Industry. What are the first steps a company should take to protect itself? What are the foundational cybersecurity elements that all companies should have in place? Attend to learn more!
-
Trey Maust
Chair, Operational Resilience Framework Work Group & Executive Chairman
Lewis & Clark BankResponse to Ransomware – Operational Resilience
Join this session to learn about the cross-sector work of security industry leaders who are developing a framework to help ensure resilience in the face of destructive malware, ensuring the immutable and recoverable nature of data, systems, networks, applications and configurations. There is a lot of discussion of data backups in the face of cyber attacks, but we must also have the ability to maintain operational continuity in the face of an attack. Safe data doesn’t mean much if you or your customers can’t access it. The Operational Resilience Framework (ORF) Working Group is seeking to address both problems.
-
Swatantr Pal
Incident Response & Information Protection Leader
GenpactReflections on Navigating a Cloud Journey
Genpact, a professional services firm with over 90,000 employees, has been on a multi-year journey of adopting cloud across SaaS and IaaS. They have been early adopters of solutions like CASB and Cloud Security Monitoring. Join them in this session to hear them share lessons learnt in their journey, and a practitioner perspective in deploying best practices.
-
Mitushi Pitti
Director
KPMG Cyber Security ServicesOpening Keynote: Future of Third Party and Supply Chain Security
-
Chris Richter
North America Security Practice Leader
AvanadeRansomware Readiness: What Not To Do
Chris Richter and Allan Alford share horror stories about organizations that have made terrible mistakes in defending against, and recovering from, ransomware attacks. (We won’t name and shame!) We hope to get the audience laughing at the foolishness, but to also reflect on how their ransomware readiness could be improved.
-
Jim Rosenthal
Co-Founder and CEO
BlueVoyantManaging Cyber Risk Across the Extended Vendor Ecosystem
During this session, Jim Rosenthal, BlueVoyant co-founder and CEO, will share the key insights and findings from our BlueVoyant 2021 Global Insights Report.
The BlueVoyant 2020 Global Insights Report stated that “managing third-party vendor cyber risk is fast becoming the defining cybersecurity challenge of our time.” This year, the survey not only explores the scale of the challenge; but also the level of supply chain breaches and the resources risk executives have at their disposal. Join this session to hear what your peers in multiple industries and regions shared about their response to the challenges of ensuring cybersecurity in their supply chain and our recommendations on how to manage and protect your ecosystem.
-
Sam Rozenberg
Director, Security Risk Analysis
KPMGConsequence Driven Resilience: Utility Perspectives on Accommodating Cyber, Climate and Systemic Risk
Organizations of all shapes and sizes, including electric utilities and their stakeholders, are wrestling with the proper balance of consequence, likelihood, and prioritization in the face of an increasing array of risks and threats, whether natural or manmade, which can come at any time and in combination. In a fireside chat format, Sam Rozenberg and Andy Bochman will discuss how organizations large and small are seeking this balance while approaching resilience challenges by examining current case studies that show the importance of a risk-based approach to resilience.
-
Vincent Scheivert
Director of Technical Strategy
Telos CorporationCyber Supply Chain Risk Management: There is Hope… and Help!
Cyber Supply Chain Risk Management, or C-SCRM, has undoubtedly come to the forefront of the news cycle in the cyber world due to unprecedented breaches like the SolarWinds and Colonial Pipeline hacks. So, it’s no surprise C-SCRM has also become the one of the primary concerns of company executives across the world, and cyber and compliance teams are being asked to implement C-SCRM into their cybersecurity risk management plans. Fortunately, there are free and authoritative resources available to those struggling to get a foothold on where to start.
In this session, Vincent Scheivert, Director of Technical Strategy for Telos Corporation, will discuss why implementing a C-SCRM plan is critical, what the challenges are, and the guidance you can find in resources from the National Institute of Standards and Technology (NIST) and the ICT Supply Chain Risk Management (SCRM) Task Force established by CISA.
-
Valentina Soria
Executive Director, Head of Global Intelligence
Morgan StanleyExplain to me what you mean by Business Risk – Building a Threat Intelligence function for the Operational Resilience Era
Forward-leaning approach to managing risks. This is how one should think of threat intelligence these days, no longer as a technical niche function that sits in the back of the room and passively collects indicators of compromise. Intelligence should be used to challenge conventional wisdom about what your senior leadership should be concerned about. Intelligence teams should make senior leadership and business stakeholders feel ‘uncomfortable’ about how they think about certain scenarios or the state of their organization’s risk posture. This presentation explores how to fully operationalize and evolve your intelligence program in light of the growing regulatory and organizational focus on operational resilience. In this context, a holistic approach to intelligence is one that goes past structural silos, allowing organizations to anticipate, and prepare for, any type of operational disruption to the business. It will also discuss how to measure the value of your intelligence function.
-
Alison Tarnopol
Director, Business Continuity
Fidelity InvestmentsAre your vendors your weakest link?
Understanding third party vendor risk is essential for organizational resiliency. This session will address best practices for assessing vendor risk and resiliency, understanding inherent risks and potential impacts to the organization, and tying vendor risk into a comprehensive resiliency program.
-
Mike Wagner
Sr. Director, Global ISRM Leader for Supply Chain
Johnson & Johnson TechnologyOpening Keynote: Future of Third Party and Supply Chain Security
Sponsors
PLATINUM
DIAMOND
GOLD
Our Past Attendees
The summit was excellent!
– Darla Graff, Third-Party Risk Manager, Erie Insurance
From a relevance standpoint, this was the most impactful summit I have been to in quite a long time.
– Kurby Brown, Associate Manager, Informatin Security, iCIMS
Very organized with a variety of informative speakers presenting on different topics. Also plenty of opportunities to interact with folks.
– Tripp Hardy, CEO, Reprivata
The summit was outstanding! I hope I am able to attend again next year.
– Jacob Maenner, Supervisor, Security Risk Management, Exelon
In Collaboration With