3rd Party Risk Management , Governance & Risk Management

Ongoing Monitoring of Third Party Risk

ProcessUnity's Todd Boehler on Who Should Own it, How to Do it
Todd Boehler, Senior Vice President of Product Strategy at ProcessUnity

It’s understood: Ongoing monitoring of third party relationships is mission-critical. But what constitutes ongoing monitoring? Who should own it? Who should do it? Todd Boehler of ProcessUnity addresses these questions and more.

In a video interview with Information Security Media Group, Boehler discusses:

  • The meaning of ‘ongoing monitoring;’
  • How to do it effectively;
  • How to operationalize what you learn.

Boehler is the Senior Vice President of Product Strategy at ProcessUnity. He has more than 20 years’ experience in product management and strategic roles for leading technology providers. In 2003, his governance, risk and compliance (GRC) startup was purchased by Stellent, which was soon after bought by Oracle Corporation. He worked for Oracle for seven years before joining ProcessUnity in 2014. He has extensive GRC experience, working with organizations’ engineering, services and sales teams to develop solutions, enable sales and deliver customer success.

Boehler is responsible for collaborating with customers, partners, and internal product teams to develop and deliver high-value risk and compliance solutions. In his role, he drives the company’s cloud services roadmap and defines ProcessUnity’s overall strategic.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.