Restaurant (2) 

Houston – August 18,  2016
11:30 a.m. – 1:30 p.m.

Join us for a roundtable where we will discuss how organizations can build a systematic means to evaluate their IT risk, and share thoughts on:

  • Vendor assurance questionnaires vs. real-time threat intelligence
  • Strategies for classifying your vendors into risk profiles
  • Best practices for controlling vendor sprawl from shadow IT
  • Best practices for managing inbound vendor assurance request
  • Discussing vendor risk management with your board members

CLICK HERE TO REGISTER