imgi_3_H-ISAC_Navigator_Logo 3

Webinar: How to integrate AI, Continuous Risk Monitoring and Assessments into a Best in Class Vendor Risk Management Platform

In the rush to adopt AI and continuous monitoring for third-party risk, many teams are sidelining assessments - and it’s a costly mistake. Monitoring can’t verify internal controls like MFA enforcement, data encryption, and access governance. Learn how to combine AI tools and continuous risk monitoring with strategic use of assessment and document intelligence - Monitor + Assess + Extract - to provide unparalleled verification of the security of your supply chain and vendor network.

Date:

December 17, 2025 (Wednesday)

Time:

12 PM ET / 11 AM CT

Format:

Panel Discussion

Audience:

TPRM, Security, Compliance (regulated industries)

Built for regulated industries.
End-to-end, painless VRM.

Speakers

Mike Kelly

CEO/Perimeter

Mike Kelly is the CEO of Perimeter (formerly ProcessBolt). Mike started his career at the law firm now known as Faegre Drinker. After making partner, he left to become the EVP and COO of the Minnesota Vikings. Following the sale of the Vikings, Mike held several CEO and senior executive roles at a number of varied businesses primarily in technology, software and analytics. Those businesses spanned a variety of industries from healthcare to business and legal services. He is a seasoned operator with a history of success in organic growth initiatives, turnarounds, recapitalizations, and mergers and acquisitions.

Derrick Lowe

Chief Security Officer/Orlando Health

Derrick Lowe serves as vice president and chief security officer for Orlando Health, where he leads the organization’s corporate security operations and information technology initiatives, including cybersecurity and business resiliency. Before joining Orlando Health in 2019 as corporate director for IT security and resiliency, Derrick served as chief information security officer (CISO) at Cape Fear Valley Health in Fayetteville, North Carolina. Derrick proudly served in the U.S. Army for more than 20 years, where he worked for the National Security Agency, U.S. Cyber Command, and U.S. Special Operations Command, protecting the United States against cyber threats.

Tyler Rossi

Chief Information Security Officer

Tyler Rossi serves as the Chief Information Security Officer (CISO) at ProHealth Care, where prior to this role he has led security transformation, vulnerability management, and enterprise risk programs. Tyler is also an Air Force veteran with over 14 years of service.

Speakers

Mike Kelly

CEO/Perimeter

Mike Kelly is the CEO of Perimeter (formerly ProcessBolt). Mike started his career at the law firm now known as Faegre Drinker. After making partner, he left to become the EVP and COO of the Minnesota Vikings. Following the sale of the Vikings, Mike held several CEO and senior executive roles at a number of varied businesses primarily in technology, software and analytics. Those businesses spanned a variety of industries from healthcare to business and legal services. He is a seasoned operator with a history of success in organic growth initiatives, turnarounds, recapitalizations, and mergers and acquisitions.

Derrick Lowe

Chief Security Officer/Orlando Health

Derrick Lowe serves as vice president and chief security officer for Orlando Health, where he leads the organization’s corporate security operations and information technology initiatives, including cybersecurity and business resiliency. Before joining Orlando Health in 2019 as corporate director for IT security and resiliency, Derrick served as chief information security officer (CISO) at Cape Fear Valley Health in Fayetteville, North Carolina. Derrick proudly served in the U.S. Army for more than 20 years, where he worked for the National Security Agency, U.S. Cyber Command, and U.S. Special Operations Command, protecting the United States against cyber threats.

Tyler Rossi

Chief Information Security Officer

Tyler Rossi serves as the Chief Information Security Officer (CISO) at ProHealth Care, where prior to this role he has led security transformation, vulnerability management, and enterprise risk programs. Tyler is also an Air Force veteran with over 14 years of service.

Monitoring sees the outside. Assessments verify the inside.

Continuous monitoring is essential, but incomplete on its own. It can surface external exposure, not whether your vendors actually enforce critical controls. Over 73% of questions in a SIG Lite can’t be answered by monitoring alone. The result: blind spots, false assurance, and risk you can’t evidence.

Over 73% of SIG Lite questions require assessments to verify

What you’ll learn

Where monitoring stops

Understand the necessity and the limitations of AI and continuous monitoring in vendor risk management.

What must be assessed

Identify high-impact internal controls that require evidence (MFA, encryption, access).

How to integrate for coverage

Integrate assessments with AI and monitoring tools - Monitor + Assess + Extract - for a best in class vendor risk management platform for small teams with many vendors.

A balanced, integrated VRM strategy

Perimeter unifies monitoring, assessments, document intelligence, and sharing to validate vendor claims and surface real risk in real time - across your entire lifecycle. That’s how you move beyond checkbox compliance to a provable security posture.

Over 73% of SIG Lite questions require assessments to verify

Who should attend

Security, TPRM, and Compliance leaders in regulated industries with small but mighty teams who need full coverage without heavy lift.

FAQ

Will I get the recording?
Is this tool-specific?
What if I already use a monitoring solution?

Close the gap between
signals and verification

Join us to learn how to pair continuous monitoring with assessments and document intelligence - for visibility you can prove.

What Users Say