Monitor and assess IT and cybersecurity risks across the organization, focusing on second-line oversight of the first line's risk management practices. * Conduct independent risk assessments and challenge the first line's processes and control effectiveness across applications, business solutions, assets, and third-party relationships. * Review and validate risk assessments and treatment plans proposed by the first line, ensuring compliance with organizational and regulatory standards. * Conduct audits and provide oversight of IT and cybersecurity practices within the first line of defense, especially in third-party risk management. * Act as a trusted to the business, providing guidance on emerging risks and ensuring that the first line implements appropriate risk mit
meer