A professional man wearing a dark blazer and black t-shirt speaking on stage against a completely black background. He is holding a presentation clicker in one hand and gesturing with the other while looking off-camera.

The 60-Minute Security Audit™

A leader's framework for managing third-party risk. Learn how to vet your software partners and turn data compliance into a competitive advantage.

Duration

Half-Day or Full-Day

Format

In Person & Virtual

Price Range

$10,000+

Turn compliance from a chore into a competitive advantage.

Data security is rarely the topic that gets anyone excited. It usually feels like a chore, a necessary evil, or the corporate equivalent of eating your vegetables. But you aren't just moving physical items anymore; you are moving sensitive customer data, and your security is only as strong as your weakest vendor.

In this interactive workshop, we move beyond the headlines to provide a clear, non-technical, executive-level framework for managing third-party risk. Drawing from my experience building Yembo's security culture from the ground up, achieving ISO 27001, SOC 2 Type II, and GDPR compliance, I'll show you what "good" actually looks like without the confusing jargon.

A male speaker presenting with a microphone on an outdoor stage beside a large screen displaying '02 What AI can do'.
Four professional speakers sitting on stage during a panel discussion at the ENGAGE 24 conference with a bright blue backdrop and an audience in the foreground.
A male speaker presenting to a small seated audience in a modern conference room with a slide titled GROW UP FAST about AI visible on a large screen.
A male speaker presenting on an outdoor stage beside a large digital screen displaying the slide 'Who Yembo is' with key company facts.
Sofie Abramowitz
"Zach Rattner was fantastic to work with from start to finish. His presentation was very engaging and left the audience buzzing."
— Sofie Abramowitz, Event Production Coordinator, Key Media

Get Your 60-Minute Audit.

Get a head start on the workshop framework. Download my free "Sleep at Night" Security Checklist to immediately lock down your internal data flow and evaluate your current software vendors.

Download the Checklist

Book this workshop

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.