It can be tough deciding how much automation you want to introduce into a particular IT security function. While automation does bring speed and efficiency, companies sometimes like to rely on human judgment for important security decisions. This debate is certainly true for third-party risk management, as companies debate if they want to use automation for things like risk prioritization or triggering a vendor reassessment or performance review in the event of an alert. In this session, we will examine the pros and cons of incorporating automation into the various elements of third-party risk management.
Senior Vice President
Parham Eftekhari is a business executive specializing in cyber and national security. He currently serves as a SVP at CyberRisk Alliance, leading its CISO services group the Cybersecurity Collaborative. Parham also serves as the chairman of the Institute for Critical Infrastructure Technology (ICIT), the nation's leading cybersecurity think tank which he founded in 2014.
Mike Wilkes is the Chief Information Security Officer (CISO) at SecurityScorecard. Wilkes is responsible for developing enterprise-wide security programs to protect corporate systems as well as growing and extending the SecurityScorecard platform to customers, executives, and boards of directors. Wilkes is a technology evangelist with experience reaching back to the earliest days of the internet and the birth of ecommerce (he and his team built, launched, and supported starbucks.com in 1998), Mike has been leading the digital transformation of globally renowned brands such as Sony Playstation, Macy's, nVidia, KLM, and many others.