Curriculum

How do you filter through the noise and control your third­-party cyber exposure? Join us as we discuss the following key components you must have in place to have a solid foundation for your vendor risk management program:

Controlling Third-­Party Cyber Exposure

  • Understanding the process of third-­party risk management
  • Developing or using rating systems
  • Managing vendor fatigue

Determining Third-­Party Financial Viability

  • Key independent third­-party sources
  • Key metrics that reveal risk in vendor assessments

Instructors

  • Kevin Sasser

    Kevin Sasser

    Argos Risk / Director


    Kevin Sasser serves as Director of Sales and Marketing for Argos Risk®, a leading provider of third-party risk management services for financial institutions and other organizations. With over 20 years’ experience in working with organizations in designing and implementing enterprise applications and mission critical systems, Kevin now works with institutions in implementing automated third-party risk monitoring and mitigation programs. Drawing from his background in launching multiple companies, managing a third-party payment processor, and almost two decades of working with financial institution executives, Kevin has delivered numerous keynote addresses at national conferences, seminars, and user group meetings. He delivers an authentic, straight-forward message laced with humor, personal experience, and no-nonsense advice. Kevin has delivered hundreds of presentations for banking and payment associations as well as organizations such as The Federal Reserve Board of Governors, The Executive Office of the President of the United States, The U.S. Department of State, The Central Intelligence Agency, and The Carlyle Group. Before joining Argos Risk, Kevin spent several years working with Atlanta-area startups, Fortune 2000 companies, and the Federal Government.
  • Max Aulakh

    Max Aulakh

    CEO, Ignyte Assurance Platform


    Max Aulakh is the CEO of Ignyte Assurance Platform, where he works with top CISOs in the country to deliver DoD-tested security strategies and compliance that safeguard mission-critical IT operations. Having trained and excelled in The United States Air Force, Max maintained, and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.

Credits

1.0 CPE Credits & 1.2 AAP Credits