Sep 17: Hands-on pre-event workshop with Keylight Assessments

Sep 18: Third-Party Risk Management focused Keylight Sessions



Chicago Marriott O’Hare
8535 W Higgins Rd
Chicago, IL 60631

Sep 17 – Pre-Event Workshop

11:00 AM – 1:00 PM

Keylight User Roundtable with Professional Services

Lockpath Professional Services

Join Lockpath Professional Services and fellow Keylight users for a lively discussion on how best to manage third-party risk in Keylight. Participants will have the opportunity to discuss specific use cases, learn from real-world application, and obtain guidance from Lockpath’s Professional Services team. Lunch is provided.

1:00 PM – 4:00 PM

Issuing and Reporting on Vendor Assessments in Keylight

Matt Thorne, Manager of Learning & Development, Lockpath

Learn how to get the most out of your vendor assessments. In this workshop, Lockpath’s Education and Professional Services teams will teach you how to configure the Keylight Platform to get a deeper level of information out of your vendor assessments.

1:00 – 2:15pm – Going Beyond the Basics

    • Conditional questions and sections
    • Scoring and follow-up assessments
    • Vendor contact and assessment delegation

2:30 – 4:00pm – Using findings to Extract Data from Assessments

    • Creating findings tables
    • Creating reports based on findings

Note: Limited seats available for Pre-Event Workshop

Sep 18 – LPRS19 Chicago

Agenda Subject to Change

7:30 AM – 8:30 AM

Breakfast (provided)

8:30 AM – 9:30 AM

Third Party Risk Management: Driving Enterprise Value

Linda Tuck Chapman, ONTALA

Third parties are integrated into virtually every aspect of every company’s operations. They are inseparable from critical activities, products and services, internal and externally-facing operations, and an escalating threat landscape.

The value proposition for third party risk management sits at the intersection of strategy, operations, compliance, financial and reputation management. And it must align with customer, shareholder, legal, and regulatory expectations.

9:45 AM – 10:45 AM

Third Party Design and Implementation – Pitfalls and Helpful Hints

David Mir, MIR Consulting

About to start your third-party risk management? Don’t know where to start? Or who to talk to? Maybe you do you know and have a great process built, but it never gets integrated into the organization and eventually stops being used!

Stop letting your process disappear in the wind and make your third party process stick and grow into the organization by avoiding the pitfalls and issues during implementation.

11:00 AM – 12:00 PM

Configure Keylight Beyond Out-of-the-Box for Third-Party Risk Management

Jan Arban, Molina

Adam Billings, Lockpath

This presentation describes custom ways to configure the out-of-the-box features of Keylight for third party risk management. There are many risk management frameworks to follow and depending on the industry, one framework may make more over other, but the same GRC tool is used. This presentation provides a model to help jump start the GRC configuration maturity. No matter what framework followed, Keylight can help prioritize vendors, perform assessments, track findings and monitor risks.

12:00 PM – 1:00 PM

Lunch (provided)

1:00 PM – 2:00 PM

Third Party Risk: Program governance and opportunities to transform data into decisions

Mike Pankey, Grant Thornton

In this session we’ll address typical third-party risk management organizational structures and governance, including common challenges. We’ll also provide an overview on third party management, data strategy frameworks and data modeling, which has been a more recent priority seen in regulatory and board level discussions.

2:15 PM – 3:00 PM

Lockpath Updates



By submitting this form you agree to the following: This form is only a request to attend and does not guarantee attendance at the Lockpath Ready Summit. Each request is reviewed on an individual basis. The requester will receive a registration confirmation email if the request is approved. Attendance requests are limited to one person, per email address. Additional requests to attend the LockPath Ready Summit will need to be filled out separately with each attendee’s email address.