Houston – August 18, 2016
11:30 a.m. – 1:30 p.m.
Join us for a roundtable where we will discuss how organizations can build a systematic means to evaluate their IT risk, and share thoughts on:
- Vendor assurance questionnaires vs. real-time threat intelligence
- Strategies for classifying your vendors into risk profiles
- Best practices for controlling vendor sprawl from shadow IT
- Best practices for managing inbound vendor assurance request
- Discussing vendor risk management with your board members