Articles by SB Team
Establishing a Proactive Third-Party Risk Management Strategy with Avon

Becoming proactive in cyber security is never easy.

Join Paul Norton, Head of GRC at Avon, and Al McLaughlin, TPRM expert from BlueVoyant as they explore Avon's journey to a proactive third-party cyber risk management program. In this webinar you'll gain insider insights into Avon's strategic approach to program development, the process through which they scaled and matured their vendor monitoring, and the state of their TPRM program today. Discover the challenges they faced, the solutions implemented, and the transformative results achieved with BlueVoyant's partnership.

Mark your calendar for October 28 at 1pm BST as we explore:

  • Tackling the Vendor Monitoring Challenge: Modern enterprises rely on hundreds—even thousands—of vendors, creating a vast attack surface that's often poorly understood or monitored.
  • A Critical Vendor Use Case: Limited visibility among critical vendors can lead to security gaps. Avon will share a real-world example discovered only through external threat detection.
  • Securing Funding Before a Breach Occurs: Convincing leadership to invest in cyber risk management proactively can be tough. Discover tips on how to make a compelling case to get executive buy-in.
  • The Importance of Continuous Risk Remediation: Knowing you have a risk is step one—knowing how to remediate it is what moves the needle.

Whether you're in retail, manufacturing, or beyond, this session promises actionable strategies to elevate your organisation's cyber security posture.

Read More ...
Security Leader Panel: Nonnegotiables, Challenges, and Endpoint Security in the Age of AI

Join us as a panel of security leaders discuss the challenges facing them today, endpoint security features that are nonnegotiable, and how they use theGartner® Magic Quadrant™to inform their purchasing decisions.

Register to get insights like:

  • How security program priorities have changed in the last year
  • Challenges security leaders are facing
  • How leaders are evaluating tools for their security programs
  • Real-world security applications of generative and agentic AI

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Speakers:

Ryan Priest

CIO, Verto

John Lemko

Director Of Cybersecurity Operations, Canadian Credit Union

Doug Vondera

Field CISO, SentinelOne

Read More ...
Subscribe for the Latest News

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Webinars
Establishing a Proactive Third-Party Risk Management Strategy with Avon
No More Weak Links: Unleashing NDR and SASE for Hybrid Networks
Identity Security Essentials: Protecting Against Modern Cyberthreats