Linda Tuck Chapman
Third Party Risk Institute Ltd.
Ms. Tuck Chapman is a leading expert in third-party risk management. As one of the first Chief Procurement Officers and Head, Third Party Risk Management in the financial services sector she lead creation of best practices in strategic sourcing and high-impact third party risk management. As an advisor she is a hands-on leader, working collaboratively to help assess, strengthen, and mature client programs and practices. Her best-selling book “Third Party Risk Management: Driving Enterprise Value”, now in its second edition, is mandatory reading for “Certified Third Party Risk Management Professional” (C3PRMP).
AVP, GRC Solutions
Mr. Ramanujam seasoned technology management professional with over 15 years of software industry experience with over 10 years in architecting, developing and delivering reliable and scalable Enterprise Class Web applications and messaging services for Audit, Governance, Enterprise, Operational & Third party Risk, Compliance management, and Learning Management Systems. He has extensive experience in establishing effective technology strategies, delivering critical projects on-time and on-budget, demonstrating a track record of creating and implementing enterprise governance models, creating technology roadmaps, and aligning business corporate objectives and technology initiatives to tangible solutions within the GRC domain. Mr. Ramanujam have a progressive experience in all facets of Software Application Development and demonstrated ability to lead cross-organizational technology and product development projects including solution architecture, requirements management, project planning, statement of work creation, execution management, risk management, budget management, vendor management and an ability to build and manage effective customer relationships.
The SolarWinds hack is a recent and significant example of the damage that can be caused by a third-party risk event and how organizations need to be extremely vigilant about the threats that lurk deep within the third-party/vendor ecosystem. Although, this type of attack is not unknown, it falls under the category of one of the hardest types of risks to thwart as it exploits trusted relationships between vendors, customers, and machine-to-machine communication channels. Unfortunately, most organizations are not prepared for this kind of a software supply chain attack. In order to safeguard their business operations, it is now imperative for CSOs, CISO's, CROs, and the board to think beyond compliance checklists and define proactive measures when it comes to managing third-parties.
Join this webinar to learn: