Webinar

Industry Leaders

About Our Experts

Colin Whittaker

Founder & Director at Informed Risk Decisions Ltd
Colin is a leading payments security expert with extensive experience shaping global risk strategy. A former PCI SSC Board of Advisors member, he drove major security and compliance initiatives at APACS and Visa Europe. Now an independent consultant, he advises diverse organizations and frequently speaks and publishes on cybersecurity and information risk.

Ed Thomas

Senior Vice President at ProcessUnity
Ed is a seasoned Third-Party Risk Management expert. With deep industry knowledge and practical insights, he helps organizations build efficient, effective risk programs. His guidance empowers businesses to maximize the value of TPRM and strengthen resilience against evolving cyber threats.

Dirk Schrader

Global VP of Security Research, Netwrix
Dirk Schrader is a 25-year cybersecurity veteran with CISSP and CISM certifications. He champions cyber resilience through global projects, thought leadership, and published insights on change and vulnerability management—bridging technical, product, and strategic roles across startups and multinational corporations.

Nicholas Geyer

Sr. Product Marketing Manager for Third-Party Management at OneTrust
Nicholas is the Sr. Product Marketing Manager for Third-Party Management at OneTrust. He leads go-to-market strategy and product positioning for TPRM solutions, helping organizations understand evolving vendor risks and adopt data-driven, scalable approaches to building secure third-party ecosystems through modern technology.

CPE Webinar | Risk in Real Time: Continuous Monitoring & Cyber Resilience

Mar 5 / IT GRC Forum
In 2026, static defense is obsolete as AI-driven agentic threats accelerate exploitation, forcing a shift from reactive security to autonomous resilience. This webinar explores integrating continuous monitoring with proactive recovery frameworks to maintain uptime against hyper-automated attacks and post-quantum risks. To survive, leaders must replace periodic audits with real-time, AI-augmented visibility, building a "defense-in-motion" strategy that prioritizes business continuity over perimeter protection.

Participants will master Continuous Threat Exposure Management (CTEM) for real-time risk prioritization and learn to implement "graceful degradation" tactics to ensure core services survive active breaches. The session covers deploying behavioral identity protocols to neutralize deepfakes and automated social engineering while identifying critical assets to shield against emerging post-quantum decryption risks. By focusing on high-fidelity telemetry and rapid recovery, organizations can future-proof their data pathways and maintain operational integrity. Attendees will leave with a practical blueprint for navigating a landscape where speed, feedback, and adaptive response decide the ultimate outcome of every encounter.