<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Session: Intrusive Monitoring: The Nuclear Option for Monitoring Third Parties in Past Security Congresses</title>
    <link>https://community.isc2.org/t5/Past-Security-Congresses/Session-Intrusive-Monitoring-The-Nuclear-Option-for-Monitoring/m-p/41#M2</link>
    <description>&lt;P&gt;This conversation launches at ISC2 Congress on Monday afternoon where I discuss various options for organizations to monitor internal operations of their most critical third party service providers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Third Party Risk Management (TPRM) is a "thing" now. It's a relatively new topic that requires CISOs to allocate resources to do a better job of identifying and managing risks in third party organizations that provide products or services to an organization. TPRM operations can be very time consuming but there are platforms and tools that can help make the job easier and save costs as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Full disclosure: my employer has one such service, known as Evantix. More info &lt;A href="https://www.optiv.com/solutions/third-party-risk-management/evantix" target="_blank"&gt;here&lt;/A&gt;. (full link:&amp;nbsp;&lt;A href="https://www.optiv.com/solutions/third-party-risk-management/evantix" target="_blank"&gt;https://www.optiv.com/solutions/third-party-risk-management/evantix&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, my talk is not a sales pitch - I will barely mention Evantix, if at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See you at my session, and let's continue this afterwards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Peter H Gregory&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;Executive&amp;nbsp;Director – CISO Services&lt;/P&gt;
&lt;P&gt;CISSP, CISA, CISM, CRISC, C-CISO, CCSK, PCI-QSA&lt;/P&gt;
&lt;P&gt;&lt;A href="mailto:peter.gregory@optiv.com" target="_blank"&gt;peter.gregory@optiv.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.optiv.com/" target="_blank"&gt;www.optiv.com&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 09 Oct 2023 08:16:54 GMT</pubDate>
    <dc:creator>phg</dc:creator>
    <dc:date>2023-10-09T08:16:54Z</dc:date>
    <item>
      <title>Session: Intrusive Monitoring: The Nuclear Option for Monitoring Third Parties</title>
      <link>https://community.isc2.org/t5/Past-Security-Congresses/Session-Intrusive-Monitoring-The-Nuclear-Option-for-Monitoring/m-p/41#M2</link>
      <description>&lt;P&gt;This conversation launches at ISC2 Congress on Monday afternoon where I discuss various options for organizations to monitor internal operations of their most critical third party service providers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Third Party Risk Management (TPRM) is a "thing" now. It's a relatively new topic that requires CISOs to allocate resources to do a better job of identifying and managing risks in third party organizations that provide products or services to an organization. TPRM operations can be very time consuming but there are platforms and tools that can help make the job easier and save costs as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Full disclosure: my employer has one such service, known as Evantix. More info &lt;A href="https://www.optiv.com/solutions/third-party-risk-management/evantix" target="_blank"&gt;here&lt;/A&gt;. (full link:&amp;nbsp;&lt;A href="https://www.optiv.com/solutions/third-party-risk-management/evantix" target="_blank"&gt;https://www.optiv.com/solutions/third-party-risk-management/evantix&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, my talk is not a sales pitch - I will barely mention Evantix, if at all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See you at my session, and let's continue this afterwards.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Peter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Peter H Gregory&lt;/STRONG&gt;&amp;nbsp;|&amp;nbsp;Executive&amp;nbsp;Director – CISO Services&lt;/P&gt;
&lt;P&gt;CISSP, CISA, CISM, CRISC, C-CISO, CCSK, PCI-QSA&lt;/P&gt;
&lt;P&gt;&lt;A href="mailto:peter.gregory@optiv.com" target="_blank"&gt;peter.gregory@optiv.com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.optiv.com/" target="_blank"&gt;www.optiv.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 08:16:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Past-Security-Congresses/Session-Intrusive-Monitoring-The-Nuclear-Option-for-Monitoring/m-p/41#M2</guid>
      <dc:creator>phg</dc:creator>
      <dc:date>2023-10-09T08:16:54Z</dc:date>
    </item>
  </channel>
</rss>

