Third-Party Compliance and Accountability Key Strategies

Enterprises are now, more than ever, relying on a higher number of third-party, mission-critical technologies (along with their support and maintenance). As a result, enterprises are unintentionally opening themselves up to the largest source of data breaches.

Tony Howlett, CISO at SecureLink and Glenn Kramer, President of UniSec, Inc., discuss how to ensure that your organization is adhering to regulatory compliance requirements specific to vendor remote access while also reducing your organizational risk.

Download this webinar to learn:

  • Lessons from recent third-party vendor-related data breaches
  • The four business risks imposed by third-party vendors and how to combat them
  • Best practices for industry-specific third-party risk compliance
  • Strategies for managing and restricting vendor access


Tony Howlett, CISO – SecureLink

Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA certifications, and a B.B.A in Management Information Systems. Tony is currently the CISO of SecureLink.

Glenn Kramer, President – UniSec, Inc.

Glenn Kramer is President of UniSec, Inc. an information security managed services company providing compliance and information assurance services to highly regulated sectors, such as healthcare, finance, and government.  Prior to that, he served as President of Network Security Services, Inc., an IT security company, focusing on IT and compliance audits for financial, medical and PCI-DSS clients, CEO of Hometouch, Inc., a software-based home automation company, President of InfoHighway International Inc., and Founder and Chief Executive Officer of Classic Configurations, Inc. He has also served as a management and marketing consultant to a number of industry leaders such as Hewlett Packard, Compaq, Lexmark, Digital, Novell and MicroAge.

Access the webinar

close close