
Learn the best case studies on the end to end cyber security implementation practices
when working with third parties to ensure a truly resilient and secure supply chain network at
the Third Party & Supply Chain Cyber Security Summit.
Led
by the TOP Information Security professionals from leading companies the discussion will give you an opportunity
to see the issue from the perspective of different industries & angles and identify the
complex solution to be implemented.

Skyscanner

SouthernCarlson

Cambridge Mobile Telematics

eBay

Amazon Web Services

Truist Financial

Northern Trust Corporation

Data Privacy Analytics

Waterloo North Hydro Inc

Allstate

Almirall

Greenyard

Mubadala Capital

Tel-Aviv University

Huawei Western European Region

IBM

Spark Minda Group

Finologee

Transcom

BBVA Spain

Huawei

IFRC

NetJets

Gebauer & Griller

Philips


BBVA

LEET Security

Darktrace

RiskRecon

SureCloud

Honeywell

Standard Chartered Bank

SecurityScorecard

OneTrust

Palo Alto Networks

Saudi Aramco

BitSight

Interos

Panorays
The registration is available online here. On the registration page, you can also check early bird and standard registration rates. If you would like to pay via bank transfer, please contact us at [email protected] and we will advise you on further steps shortly.
The standard delegate pass includes all physical & online conference materials, coffee breaks with snacks, hot lunches, and cocktail reception. Please note that accommodation is not included in the registration fee and must be booked separately. Contact us at [email protected] for the conference hotel discounted rates for our group.
Yes, we are delighted to provide the groups of 3 and more participants with a discount. The more people you bring, the bigger is your discount!
Absolutely! Contact us at [email protected] with your request and we will provide you with more details.
Yes, we can issue a certificate of attendance with CPD points upon a request.
In case you would like to cancel your participation for some unexpected eventualities, such requests must be submitted in written form and sent by post or email four weeks prior to the event in order to obtain a full credit note for any future event organised by GIA Global Group s.r.o. The fees charged are strictly nonrefundable.
In the event that GIA Global Group s.r.o. cancels the conference, delegate payments at the date of cancellation will be refunded in full. In the event that GIA Global Group s.r.o. postpones a conference, delegate payments will be credited towards the rescheduled date.
Yes, places within a company are transferable without any charge. In order to do so, please notify us in advance at [email protected]
You can express your interest to speak at the Summit by submitting the form here.
You can check more details on the partnership opportunities here.
Please check our events Safety Protocol here.
Although the participation in-person gives you much more opportunities in terms of learning & networking, we do realise that not everyone can join us live. That is why we provide an option to attend the Summit virtually for a reduced registration rate. The virtual pass includes access to the event platform where you can watch main agenda presentations, check exhibition area, connect and chat with participants. For more details please contacts us at [email protected]


Subscribe to our newsletter for the latest summit news and get a promo code for 5% discount on registration
GIA Global Group will use this information to contact you about relevant content, products, and services. You may unsubscribe at any time. For more information, check out our Privacy Policy.
GIA Global Group s.r.o. 2021. All Rights Reserved.
A well known International thought leader on Information Security issues, including Risk Management and Information Security Awareness strategies. Previously helped develop one of the earliest globally successful CBT programs for Security Awareness “For Your Eyes Only”. Has held positions on various security influencing bodies including APACS, LINK and Common Criteria.
Darktrace is the world’s leading cyber AI company and the creator of Autonomous Response technology. Its self-learning AI is modeled on the human immune system and used by over 4,000 organizations to protect against threats to the cloud, email, IoT, networks and industrial systems.
The company has over 1,300 employees and headquarters in San Francisco and Cambridge, UK. Every 3 seconds, Darktrace AI fights back against a cyber-threat, preventing it from causing damage.
Website: www.darktrace.com
Twitter: twitter.com/Darktrace/
LinkedIn: linkedin.com/company/darktrace/
RiskRecon, a Mastercard company, is the only continuous vendor monitoring solution that delivers risk-prioritized action plans custom-tuned to match your risk priorities. RiskRecon provides the world’s easiest path to understanding and acting on third-party cyber risk, enabling security and risk teams to efficiently build scalable, third-party risk management programs for dramatically better risk outcomes. Learn more about RiskRecon, request a demo or visit the website at
www.riskrecon.com.
Twitter: https://twitter.com/riskrecon
LinkedIn: https://www.linkedin.com/company/riskrecon
Facebook: https://www.facebook.com/riskrecon/
Source Defense is the market leader in Client-side Security for websites, providing real-time threat detection, protection and prevention of vulnerabilities originating in JavaScript. The Source Defense patented Website Client-side Security Platform offers the most comprehensive & complete solution addressing threats and risks coming from the increased usage of JavaScript, libraries and open source in websites today.
The ADMIN management console, VICE sandboxing and WiPP data shield offerings utilize patented technology and are deployed by leading Fortune 500 enterprises in the Financial, Retail, and Healthcare markets. Headquartered in Israel, with branches across the US and a strong community of global valuable partnerships, Source Defense is the most innovative, reliable and trusted partner in the fight against client-side attacks.
Our Mission
Enabling companies to leverage their websites to drive business forward, further and faster, while ensuring security, compliance, and customer data privacy.
Website / LinkedIn / Facebook / TwitterCyberVadis provides enterprises with a cost-effective and scalable solution for third-party cybersecurity risk assessments. Our methodology maps to all major international compliance standards including NIST, ISO 27001, GDPR, and many other privacy and security laws. CyberVadis’ solution combines the speed of automation with the accuracy and effectiveness of a team of experts. We directly engage vendors from all over the world with assessments, validate results with an in-house team of security analysts, and issue companies a standardized cybersecurity rating that they can share with others, along with a detailed improvement plan for increasing their score and the ability to collaborate with clients on implementing better practices.
Do you need to trust your suppliers?
LEET Security rating provides a unique insight into the provider’s real cybersecurity capabilities. Unlike external-only rating systems, LEET’s is the result of a face-to-face and thorough audit that includes all the factors that influence the level of security of their services, combined with monitoring mechanisms to ensure that the conditions are maintained during the validity of its rating label.
Showing the level in the dimensions of Confidentiality, Integrity and Availability, customers can compare and select with confidence the services that best suit their requirements in each case.
LEET Security rating system is Recognized by the European Agency for Network and Information Security, ENISA, and the Spanish National Institute of Cybersecurity, INCIBE.
SureCloud is a provider of Gartner recognised GRC software and Cyber & Risk Advisory services. Whether buying products or services, your organisation would benefit from automated workflows and insight from the award-winning SureCloud platform. All of SureCloud’s service offerings are fully compatible with the GRC suite of products enabling a seamless integration of information, taking your risk programs to the next level.
BitSight pioneered the security ratings market, founding the company with a solitary mission: to transform how organizations evaluate risk and security performance by employing the outside-in model used by credit rating agencies.
BitSight is honored to be supported by the top scientists of the National Science Foundation, which provides financial backing to scientific and engineering efforts of national importance.
The BitSight Security Ratings Platform applies sophisticated algorithms, producing daily security ratings that range from 250 to 900, to help manage third party risk, underwrite cyber insurance policies, benchmark performance, conduct M&A due diligence and assess aggregate risk.
Interos protects the world’s largest enterprises, their reputation, and operations from supply chain attacks by nation states and criminal organizations; disruption from pandemics, tech, and trade wars; and compromise from unethical labor, financial distress, and sustainability challenges.
The Interos business relationship graph contains billions of businesses, trillions of relationships, and countless attributes. Using machine learning and natural language processing, we detect entities, infer relationships, monitor events, and assess risk – instantly and continuously.
OneTrust VendorpediaTM is the largest and most widely-used technology platform to operationalize third-party risk. The offering enables both enterprises and their vendors with technology solutions that include: the Third-Party Risk Exchange, a community of shared (and pre-completed) vendor risk assessments with 70,000+ participating vendors; Questionnaire Response Automation, a tool that helps organizations answer incoming security questionnaires; and Third-Party Risk Management software, a platform to streamline the entire vendor lifecycle, from onboarding to offboarding. More than 7,500 customers of all sizes use OneTrust, which is powered by 75 awarded patents, to offer the most depth and breadth of any third-party risk, security, and privacy solution in the market. OneTrust Vendorpedia offers purpose-built software designed to help organizations manage vendor relationships with confidence, including and integrates seamlessly with the entire OneTrust platform, including – OneTrust Privacy, OneTrust GRC, OneTrust DataGuidanceTM, and OneTrust PreferenceChoiceTM.
The Cortex XSOAR + Expanse integration makes Palo Alto Networks the ideal partner to help companies bring security from the inside out and now, from the outside in. It provides CISOs with a view of their Enterprise from an attacker’s perspective as they probe for points of weakness.
Panorays is a rapidly growing provider of third-party security risk management software, offered as a SaaS-based platform. We automate, accelerate and scale the third-party security risk management process so customers can quickly and easily manage, mitigate and remediate risk, reduce breaches, ensure vendor compliance, and improve their cybersecurity. The company serves enterprise and mid-market customers primarily in North America, the UK and the EU, and has been adopted by leading banking, insurance, financial services and healthcare organizations, among others.
Reflectiz helps companies to unleash the power of their web 3rd-party Applications and keeps online businesses safe by mitigating security and privacy risks resulting from next generation third-party threats on your website, without adding a single line of code.
Levizo is a niche service provider for Risk & Compliance to identify your exposure to risk and drive mitigation in an automated process by strengthening your risk management & regulatory compliance pillars. We offer SaaS solutions to address Information Risk, Third Party Risk & Information Security Risk assessments and mitigation.
The Levizo Suite of products is available as SaaS (Software as a Service) solutions and are configured to your business needs. Products are developed by industry leading experts in risk management, information security, best practises & standards that provide graphical business insights based on real-time analysis of transactional data.
Levizo is headquartered in Reading, UK with operations in the US, development & support center in Chennai, India.
Jscrambler provides enterprise-grade security solutions that secure the client-side of web and hybrid mobile applications.
Jscrambler’s Code Integrity provides the most resilient JavaScript protection solution for Web-based apps today. The client-side technology, which includes polymorphic obfuscation, code locks, and self-defensive capabilities, transforms the source code into a form that is extremely hard to reverse-engineer and prevents any debugging and tampering attempts. By protecting their apps’ JavaScript code with Jscrambler, businesses can incisively prevent intellectual property theft, application abuse, cheating, piracy, and data leakage.
Jscrambler’s Webpage Integrity module provides real-time visibility of client-side attacks, including Magecart web skimmers, web supply chain attacks, and data exfiltration. The Jscrambler dashboard displays precise and actionable detail about each threat to enable an immediate response. Webpage Integrity is a truly agentless solution that can easily be integrated into any SIEM.
All Jscrambler products are fully compliant with all the main tech frameworks and stacks, including HTML5, Node.js, React, Angular, Vue, Meteor, Ember, React Native, Ionic, and NativeScript.
Trusted by the Fortune 500 and thousands of businesses globally.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
| Cookie | Duration | Description |
|---|---|---|
| _ga | 2 years | Google Analytics: Registers a unique ID that is used to generate statistical data on how the visitor uses the website. |
| _gat | When you close your browser | Google Analytics: Used by Google Analytics to throttle the request rate. |
| _gid | When you close your browser | Google Analytics: Registers a unique ID that is used to generate statistical data on how the visitor uses the website. |
| collect | When you close your browser | Google Analytics: Used to send data to Google Analytics about the visitor's device and behavior. Tracks the visitor across devices and marketing channels. |
These cookies are used to deliver advertising materials relevant to you and your interests. They are also used to limit the number of times you see an advertisement as well as help measure the effectiveness of campaigns. They are usually placed by advertising networks we work with with our permission. They remember that you have visited a website and this information is shared with other organizations such as advertisers.
| Cookie | Duration | Description |
|---|---|---|
| fr | 3 months | Used by Facebook to deliver a series of advertisement products such as real-time bidding from third-party advertisers |
| tr | When you close your browser | Used by Facebook to deliver a series of advertisement products such as real-time bidding from third-party advertisers |