News

The Weakest Link – Managing Supplier and Third Party Risk

Third party vendors and suppliers often have access to your network and your organisation’s confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protecting your data. Organisations must have a clear understanding of the risks inherent in their business relationships with third parties. Continually assessing your vendors is the best way to manage your third party risk. How should you approach managing third party risk?

This presentation will cover the following topics:

·         Discuss the major failings of traditional third party risk management programs

·         Creating a supply chain awareness program

·         Creating a comprehensive catalogue of vendors and suppliers

·         Risk based segmentation of identified vendors and suppliers

·         Risk assessment and rules based due diligence activities

·         The key contractual clauses all contracts with third parties should contain and why

·         Methods for continuous monitoring

·         A model for a comprehensive process to effectively and efficiently manage third party risk

 

Third party actors often directly interact with sensitive data and business processes– organisations have been forced to adopt new controls, tactics, and technology to shield their enterprise from cyber threats.

 

CPE Hours

1.5 hours, based on the assumption you have signed the attendance sheet when attending

 

Registration and Admittance

•           Due to our sponsoring partner’s facilities, access requirements and for catering purposes, we request that you register for this event to ensure you are able to attend.

•           Registration to this session is open and free of charge to all current ISACA members.

•           A registration door prize will be drawn from the list of duly registered attendees.

Agenda

  • 5.30pm – Registration and session sign-in – required to receive applicable CPE credits
  • 6:00pm – START – Welcome, Introductions, Agenda
  • 6:05pm – Monthly PD Session, Questions & Answers
  • 6:50pm – The Soapbox – Chapter Updates, Announcements and Issues of interest to members
  • 7:00pm – 15min Topic presentation
  • 7:15pm – Networking opportunity – drinks and finger food to be served
  • 8.00pm – Event Ends

About the Speaker

Wayne Tufek

Director, CyberRisk

www.cyber-risk.com.au

Professional background

For over 20 years he has formulated pragmatic, business driven strategies to establish, execute and improve cyber risk management in ASX listed companies and some of Australia’s largest organisations across the public sector, Big 4, financial services, consumer products, education and retail sectors. Wayne is a member of Chartered Accountants Australia and New Zealand and holds the SABSA SCF, CISSP, CRISC, CISM, CISA, PCI QSA and ISO/IEC 27001 Lead Implementer qualifications. He is frequently asked to present at security conferences and events in Australia and internationally including the Australian Cyber Security Centre Conference, AusCERT, RSA APJ and CeBit.

 

Threat modelling approaches

This months PD session talk will cover different approaches of threat modelling such as STRIDE, ATASM, PASTA.  We will also look at the benefits of this approach as well as approaches for including threat modelling into Agile development, security testing and security assurance.  Lastly we will explore some tools used for threat modelling such as the Microsoft Threat modelling tool and OWASP Threat dragon with a live example.

CPE Hours

1.5 hours, based on the assumption you have signed the attendance sheet when attending

 

Registration and Admittance

•           Due to our sponsoring partner’s facilities, access requirements and for catering purposes, we request that you register for this event to ensure you are able to attend.

•           Registration to this session is open and free of charge to all current and prospective ISACA members.

•           A registration door prize will be drawn from the list of duly registered attendees.

 

Agenda

 

·         5.30pm – Registration and session sign-in – required to receive applicable CPE credits

·         6:00pm – START – Welcome, Introductions, Agenda

·         6:05pm – Monthly PD Session, Questions & Answers

·         6:50pm – The Soapbox – Chapter Updates, Announcements and Issues of interest to members

·         7:00pm – 15min Topic presentation

·         7:15pm – Networking opportunity – drinks and finger food to be served

·         8.00pm – Event Ends

Location

EY Melbourne Office – 8 Exhibition St Melbourne VIC 3000

 

About the Speaker

Rahul Lobo

Rahul Lobo is a Director in EY’s Financial Services Cyber team and is focussed on Security Architecture, Threat Modelling and Security Testing. He is a CISSP, ISSAP, CISA, SABSA SCF, OSCP, AWS Cloud Architect and CREST Registered Tester.

CISM and CISA Study Sessions

ISACA Melbourne Chapter will be conducting CISA & CISM Study Sessions to assist members preparing for the CISA & CISM Examination.  We are not able to conduct the study sessions for CRISC & CGEIT exam as we do not have sufficient candidates registered for these exams.

This is an opportunity to augment preparation for the exam.  The course will supplement the study program followed by you through knowledge sharing, review of questions along with tips and strategies for passing the examination.

These study sessions are FREE, and the details are as follows:

Venue:  Chartered Accountants ANZ, Level 18, Bourke Place, 600 Bourke Street, Melbourne, VIC 3000

CISA Study Sessions:  8th November, 15th November, 22nd November & 29th November

CISM Study Sessions:  8th November, 22nd November, 29th November & 7th December (if required)

Timings:  These sessions will be held from 5:15pm to 7:00pm on each of the following days:

If you are interested in attending these sessions, please confirm via email: president@isaca-melbourne.org.au