REGISTER

email 14 48

060425

When:    August 14th | 2025      Attend

As third-party risk management (TPRM) programs mature, successful organizations are increasingly taking a cross-functional approach—aligning stakeholders from procurement, IT, legal, compliance, and risk to build a unified strategy. This CPE-accredited webinar brings together subject matter experts from ProcessUnity and OneTrust to explore best practices for breaking down departmental silos and fostering collaborative governance.

Attendees will gain insights into creating a streamlined TPRM framework that supports enterprise-wide visibility, accountability, and efficiency.

Learning Objectives:

  • Understand the roles and responsibilities of key departments involved in third-party risk management.
  • Explore strategies for aligning workflows and centralizing risk data across teams.
  • Identify common coordination challenges and how to overcome them.
  • Learn how technology and automation can support a unified TPRM program.

Moderator

colin whittakerColin Whittaker, PCI Industry Alumni, Founder and Director Informed Risk Decisions Ltd. Colin has been instrumental in driving forward a risk and security strategy for payments over the last 15 years since he retired from the military in 2001, and took up the role of Head of Security at APACS. Whilst there he was one of the first people to be elected to the PCI SSC Board of Advisors where he was always keen to try and promote the differences in threat between Europe and UK, and the US. He was also responsible for coordinating Visa Europe's approach to cardholder data breaches in Europe, and for the changes to the Visa Europe Compliance strategy through the creation of the Technology Innovation Programme which gave the very first PCI DSS compliance relief for EMV chip accepting merchants. In 2015 he went independent and currently provides cyber security risk consultancy services to a wide range of public and private companies. Colin has presented on Information Security at major events around the world, and has published a number of papers on security.

Panel

FTShane Hasert, Director of Threat Research and Cyber Security Standards at ProcessUnity. Shane has 35 years of experience as a cybersecurity professional, and 18 of those years are dedicated specifically to third-party risk management and auditing. He is an Air Force veteran and has held positions leading security programs with several global consulting and security services firms supporting numerous industries including financial services, retail, healthcare, higher education, mortgage insurance, and gaming. Shane is a Certified Information Systems Security Professional (CISSP), Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Controls (CRISC), Certified Data Privacy Solutions Engineer (CDPSE), Certified Third-Party Risk Assessor (CTPRA), and a Certified Third-Party Risk Professional (CTPRP); and holds an AS in Intelligence Analysis, BS in Business Management and MBA in Project Management.

FTNicholas Geyer serves as the Sr. Product Marketing Manager for Third-Party Management at OneTrust. In his role, Nick guides go-to-market workstreams and product strategy across OneTrust’s third-party risk management solutions to help customers better understand the evolving risks posed by their third parties and how to leverage technology to take a data-centric and risk-based approach to create a resilient, secure, and scalable third-party ecosystem.

 

MeghanMMeghan Maneval is a distinguished figure in the cybersecurity and governance, risk management, and compliance (GRC) sectors, renowned for her innovative approach and commitment to enhancing diversity in the tech industry. With nearly 20 years of experience, she has consistently demonstrated her ability to simplify the complexities of risk for organizations around the world. Maneval leverages her unique insights to drive significant advancements in GRC processes and best practices. She's been directly involved in the development of GRC solutions, advocating for risk-centric strategies that adapt to the evolving landscape of cybersecurity. Her pioneering work in AI governance, including the design of a continuous monitoring process and the development of AI Governance curricula, showcases her dedication to responsible and secure AI usage.

CyberBanner

Banner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me
Go to top