TPRM Evolution and Trends for 2021 and Beyond
Notice: See below for CPE Policy.
Abstract
Third party risk management (TPRM) is evolving rapidly, as companies of all shapes and sizes try to get their arms around the risks arising from an increasingly interconnected business ecosystem. The dislocations of the COVID 19 pandemic are part of this reassessment of TPRM, but strong TPRM frameworks and governance are essential in every economic season.
About Our Speaker
Rolan Moldes
Senior Manager, Enterprise Risk, Business Consulting, Ernst & Young LLP
Rolan is a senior manager in the Consulting Services practice of Ernst & Young LLP. He currently serves as the US West third party risk management regional leader with more than 15 years of consulting experience focused on assisting clients to address IT and business risks and compliance challenges across industries.
Busola Oyefesobi
Senior Manager, Enterprise Risk, Business Consulting, Ernst & Young LLP
Busola is a senior manager in the Consulting Services practice of Ernst & Young LLP and has more than nine years of controls and risk assessment experience. She focuses on assisting clients assess and evaluate business and operational risks i n their current environment to determine the appropriate controls, oversight and monitoring required in order to mitigate risks and limit exposure.
Agenda
5:00 PM – 6:30 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
Webinar Rates
ISACA, IIA, ISSA,
ACFE, OWASP |
Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $10 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.