3rd Party Risk Management , Governance & Risk Management

The Maturity of Third-Party Risk Management

RiskRecon CEO Kelly White Shares Insight and Predictions
Kelly White, CEO, RiskRecon

While conventional approaches to third-party risk management remain unchanged, the industry is transitioning to a new "normal," says RiskRecon CEO Kelly White.

See Also: Breaking Down Silos With a Holistic View of Security, Risk

”The way companies manage internal cybersecurity risk is very data-driven today,” he says. “Compare that with the way third-party risk is managed, and they are very far apart. The techniques used internally inform where third-party risk management will go.”

In a video interview with Information Security Media Group at RSA 2020, White also discusses:

  • The evolving third-party risk surface;
  • Key pain points for organizations and recommendations;
  • The new "normal" for third-part risk management.

White is the co-founder and CEO of RiskRecon. He previously served in various enterprise security roles, including CISO and director of information security for financial services companies. White was also practice manager and senior security consultant for CyberTrust and Ernst & Young.

About the Author

Varun Haran

Varun Haran

Managing Director, Asia & Middle East, ISMG

Haran has been a technology journalist in the Indian market for over six years, covering the enterprise technology segment and specializing in information security. He has driven multiple industry events such as the India Computer Security Conferences (ICSC) and the first edition of the Ground Zero Summit 2013 during his stint at UBM. Prior to joining ISMG, Haran was first a reporter with TechTarget writing for SearchSecurity and SearchCIO; and later, correspondent with InformationWeek, where he covered enterprise technology-related topics for the CIO and IT practitioner.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.