Articles by SB Team
Establishing a Proactive Third-Party Risk Management Strategy with Avon

Becoming proactive in cyber security is never easy.

Join Paul Norton, Head of GRC at Avon, and Al McLaughlin, TPRM expert from BlueVoyant as they explore Avon's journey to a proactive third-party cyber risk management program. In this webinar you'll gain insider insights into Avon's strategic approach to program development, the process through which they scaled and matured their vendor monitoring, and the state of their TPRM program today. Discover the challenges they faced, the solutions implemented, and the transformative results achieved with BlueVoyant's partnership.

Mark your calendar for October 28 at 1pm BST as we explore:

  • Tackling the Vendor Monitoring Challenge: Modern enterprises rely on hundreds—even thousands—of vendors, creating a vast attack surface that's often poorly understood or monitored.
  • A Critical Vendor Use Case: Limited visibility among critical vendors can lead to security gaps. Avon will share a real-world example discovered only through external threat detection.
  • Securing Funding Before a Breach Occurs: Convincing leadership to invest in cyber risk management proactively can be tough. Discover tips on how to make a compelling case to get executive buy-in.
  • The Importance of Continuous Risk Remediation: Knowing you have a risk is step one—knowing how to remediate it is what moves the needle.

Whether you're in retail, manufacturing, or beyond, this session promises actionable strategies to elevate your organisation's cyber security posture.

Read More ...
Security Leader Panel: Nonnegotiables, Challenges, and Endpoint Security in the Age of AI

Join us as a panel of security leaders discuss the challenges facing them today, endpoint security features that are nonnegotiable, and how they use theGartner® Magic Quadrant™to inform their purchasing decisions.

Register to get insights like:

  • How security program priorities have changed in the last year
  • Challenges security leaders are facing
  • How leaders are evaluating tools for their security programs
  • Real-world security applications of generative and agentic AI

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, and MAGIC QUADRANT is a registered trademark of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.

Speakers:

Ryan Priest

CIO, Verto

John Lemko

Director Of Cybersecurity Operations, Canadian Credit Union

Doug Vondera

Field CISO, SentinelOne

Read More ...
Scaling Zero Trust: Real-World Lessons and Practical Moves

Zero Trust is no longer just a CISO priority, it’s a team effort. Whether you're setting the strategy or executing the details, the challenge is the same: how do you apply Zero Trust without slowing the business down?

This webinar will share what it really takes to scale Zero Trust from aligning stakeholders to strengthening your security posture. We’ll cover how teams are tackling exposure across identities, devices, and data; managing configuration drift; and driving control improvements with the resources they already have. We’ll also show how Reach helps operationalize Zero Trust by prioritizing action, enforcing policy, and validating posture continuously.

Topics include:

  • Where to start: Mapping Zero Trust initiatives to business goals and technical realities
  • Security + usability: Enforcing policies without breaking workflows
  • Making it threat-informed: Adapting controls to evolving attack techniques, not just checklists
  • Posture and configuration: Continuously validating that Zero Trust controls are working as intended
  • Driving change: Overcoming resistance and delivering progress across teams

If you’re working to implement or scale Zero Trust in your organization, this session will help you connect strategy to execution.

Speaker:

Tommy Hui

Tommy Hui

VP of Global Sales Engineering, Reach Security

Tommy is a seasoned cybersecurity professional with extensive experience in helping organizations protect themselves from cyber threats. Currently, at Reach Security,Tommy focuses on empowering businesses to proactively harden their environment with a cutting-edge platform that reduces risk and exposures.

Before joining Reach Security,Tommy led Sales Engineering efforts at Dazz, specializing in unified vulnerability and application security posture management, ensuring organizations could effectively identify and remediate security risks. Prior to that, Tommy helped scale the Sales and Sales Engineering team at SentinelOne leading up to their IPO.

Earlier in his career,Tommy held roles that focused on Network DLP, Security Analytics, and also worked as a DoD employee supporting cryptographic modernization and cyber weapon system program offices. With a deep understanding of cybersecurity technologies and a passion for protecting organizations from emerging threats,Tommy continues to drive innovation and security excellence in the industry.

Read More ...
Subscribe for the Latest News
Webinars
Scaling Code Security for Builders Beyond Developer-First
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Passwordless Authentication: A Practical Approach to Modernizing Access