Building Integrated Risk Management Programs for a Risk Optimized Culture

Executive Leadership & Board Member's guide to proactive risk management.

Business strategies to capitalizing on digital growth opportunities while getting cloud-native product risks under control. Learn how Start Left™'s Application Security Posture Management Platform helps.

ProductOps + Portfolio Risk Management Platform

These complimentary webinars presented by:

Make Security & Compliance a byproduct of everyday work.


Part 2 - Operationalize Company-Wide Integrated Risk Management with ProductOps Risk Analytics (The "HOW")


For Audience:

  • Chief Privacy Officer
  • CTrO (Chief Trust Officer)
  • CIO, CTO, CPSO (Chief Product Security Officer)
  • VP of IT
  • Enterprise Architect
  • VP Software Engineering
  • Office of the CISO
  • Chief Risk Officer, Chief Compliance Officer & Heads of Internal Audit
  • Compliance Director
  • VP InfoSec / Security Director
  • Security Analyst
  • Security Architect
  • Security Engineer
  • Cloud Security Engineer
  • AppSec Specialist
  • Consultants / External Assessors (Audit)


Online Business Systems, Start Left™ Security, and Risk Neutral present Part 2 exploring the "HOW" by leveraging contextualized data flows and ProductOps risk analytics. Through this approach, companies gain unique visibility of their products/applications’ team performance, security, and compliance across processes, infrastructure, and development—company-wide. This allows IT executive leadership to break down traditional silos across security, compliance, operations, and engineering by evolving IT into a “product-centric” data science organization. We call this the Product Centric Integration Model™, mapping data into a common approach, logic, algorithms, methods, cognitions, and structures—to solve contextualized problems together. Everything related to the work at hand; all the people involved, every behavior, every risky change, tool, code, security, important access, etc. Flag unauthorized architectural changes in seconds. Enforce developer guardrails to help validate business rules and compliance policies. Everything!

We breakdown the prescriptive framework PCI DSS (SLC) to discuss the elements of Software Security Governance, Secure Software Engineering, Secure Software & Data Management, and Security Communications. Compliance is about adhering with laws, rules, regulations and industry frameworks that affect IT; essentially IT-focused compliance. In reality, following this advice you can also satisfy other best practices from ISO, OWASP, BSIMM, NIST, SOC, SANS, FedRAMP, HITRUST, HIPAA, and more. And finally, leveraging this data to optimize the business value of secure product development to leverage for other business processes as related to customer relationships, audit/assessor relationships, and executive reporting.

Download a copy of the presentation slide deck:

Download Presentation

Setting the Foundation


Part 1 - Operationalizing Company-Wide Integrated Risk Management Programs (The "WHAT" & "WHY")


For Audience:

  • Executive Office
  • The Board
  • CEO, CFO, COO
  • General Counsel
  • Chief Privacy Officer
  • CTrO (Chief Trust Officer)
  • CIO, CTO, CPSO (Chief Product Security Officer)
  • Office of the CISO
  • Chief Risk Officer, Chief Compliance Officer & Heads of Internal Audit
  • Compliance Director
  • VP InfoSec / Security Director


Online Business Systems, Start Left™ Security, and Risk Neutral presented the first Executive Leadership & Board Session on Risk Enabled Growth, hosted by TechExecs.


Part 1 was a great walkthrough that explores the "WHAT" & "WHY" The Board and C-Suite must unlock an organization's growth potential by creating a Risk-Optimized Culture, while ensuring the company's brand equity, reputation, and strategies remain well-protected.

Download a copy of the presentation slide deck:

Download Presentation

Crucial for Digital Players!

We discussed key tenants that every organization must address to thrive and not merely survive in their industry vertical. You should watch these valuable sessions if your role involves:

  • Maximizing value creation achieved at the synergy of talent, tangible, and intangible assets
  • Enabling trusted digital experiences for employees, partners, and customers
  • Oversight for Strategic, Operational, Financial, Compliance or Reputation risk as part of your organization's 3-Lines of Defense (3LoD)
  • Mitigating the potential disruptive impact of disruptive events and unlocking the economic potential of your organization's physical, cyber, IT or OT assets

Industry Update

Learn from industry leaders:

  • How converged, mature physical and cybersecurity risk management capabilities enable trusted digital experiences for employees, partners, and customers
  • Why minimizing deviation from expected outcomes creates market leadership
  • Why systemic risk treatment capabilities create culture that maximizes growth

Meet Our Speakers

Rob Harvey

Managing Director - Risk, Security,
and Privacy at Online Business Systems

Rob Harvey, Managing Director - Risk, Security, and Privacy at Online Business Systems | As the Managing Director of Online Business Systems' Risk, Security and Privacy Practice, Rob is helping to build, grow, and lead a pragmatic, risk-based business-minded security consulting practice that focuses on advisory services with governance/program management, assessment services including PCI, ISO, NIST, and HIPAA, and technical services such as vulnerability management, and application security. Rob confidently uses his business and technology expertise with over fifteen years of Payment Card Industry Data Security Standard (PCI DSS) consulting experience, over twenty years of cybersecurity consulting experience and over twenty-five years in Information Technology to his current role. Rob holds CISSP, ISO 27001 Lead Auditor, and QSA certifications and has conducted hundreds of assessments over the years including advising C-Suite and Board of Directors on cybersecurity to help mature their organizations. "With a focus on driving Information Security and Risk Management forward from the inside out." Rob offers a track record of developing solutions that reduce operational risk, meet compliance goals, and support revenue-generating operations by risk enable growth. Effectively bridge and translate communications between executive-level management and technology personnel while working with SMB to Fortune 500 organizations in North America and around the world.

Jeremy Vaughan

CEO & Co-Founder at Start Left™ Security.

Jeremy Vaughan, CEO & Founder Start Left™ Security   Jeremy Vaughan is the visionary leader and founder of Start Left™, a leader in the application security posture management arena. A graduate of the University of North Florida, Jeremy has spent his career helping businesses thrive. His journey began as a business consultant using hands-on analysis and integrated improvement strategies to grow his client's customer base and profits to new levels of success. His later experience in SaaS, product development, security, and risk management led Jeremy to launch his own software business that offers a cutting-edge platform that will bring his customers to the forefront of their industries. Throughout his career, Jeremy's focus has been on providing positive results to his clients that better help them serve their customers. His relentless attention to detail, intricate knowledge of the software and cybersecurity industry, and business savvy have led to patented technologies, building a legacy of innovation and leadership. In his free time, you can find Jeremy enjoying the beautiful outdoors, mentoring other entrepreneurs, and hanging out at the softball field helping his daughter sharpen her skills.

Jeff Sauntry

Founder and CEO at Risk Neutral

Jeff Sauntry, Founder and CEO at Risk Neutral | Jeff's expertise spans risk management, regulatory compliance, privacy, digital payments, fraud, and physical security. He has 30 years of executive leadership experience with publicly traded and private global professional services, platform as a service (PaaS), enterprise software, cybersecurity, and telecommunications firms. Jeff has led bespoke innovation, cultural transformation, M&A, and R&D commercialization initiatives for Fortune 10 and private equity-backed corporations. A results-focused board member who believes cognitive diversity and sound corporate governance create a competitive differentiator for the organizations he serves. Jeff is the Chairman of Invision Communications, Executive Committee Member of the Tampa Bay chapter of the PDA. Jeff is an NACD Certified Director and Leadership Fellow - Cyber-risk oversight. He is a distinguished alumnus of Carnegie Mellon's Chief Risk Officer program and an active member of the Communications Information Sharing and Analysis Center (Comm-ISAC).

Greg Kraft

Principal Consultant of Cyber Risk, Security
& Privacy at Online Business Systems

Greg Kraft, Principal Consultant of Cyber Risk, Security & Privacy at Online Business Systems | Greg specializes in payment security. He previously held roles as VP of Cyber Risk for an international consultancy, CISO of an African Payment Provider and has 28 years of industry insight. He holds seven qualifications affiliated with the Payment Card Industry Security Council amongst many years of technical, strategy and developmental qualifications. His passion for all things cryptographic is only exceeded by an indelible enthusiasm for all things aviation, which he enjoys in his spare time. Through years of perpetual engagement with enterprise organizations across the globe, accompanied by constant participation in industry forums and working groups, enables a unique view on resolving client challenges, while striving for perpetual improvement in their overall security posture.

Panel Discussion

  • Why key business growth milestones and organizational capabilities evolve over time to either enable or hinder an organization's ability to achieve strategic goals

  • Why company-wide efforts to create a ubiquitous 'risk aware' culture, supported by aligned resources and orchestrated oversight, allow organizations to take advantage of growth opportunities

  • How leadership teams can utilize informed scenario responses, focused on protecting the organization's most important tangible & intangible assets will enable an acceptable level of risk exposure

  • How industry leaders achieve sector leading growth and financial returns utilizing risk-informed pricing and unlock the economic potential of megatrends by continuously earning stakeholder trust

Industry Invitation Committee

Share by: