CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Blog

Track LOG4J Vulnerabilities in your Cyber Supply Chain – Black Kite Adds LOG4J Status Tags For Third-Parties

Late last week, Apache released yet another update to mitigate the Log4j vulnerability and further flaws discovered as the incident has progressed.  The newest update is version 2.17.0, which works to patch a denial of service, or DOS, vulnerability, known as CVE-2021-45105. It is important to update to 2.17.0 immediately, and continue to update with each future release of…

LEARN MORE

Blockchain TPRM Implications

As an industry, government, and technology partners work to identify the key elements required to make blockchain mainstream (sovereign identity agreements, improved safety, and related regulations, interoperability and functionality, open and transparent commercial availability), the time to focus on risk in relation to DLT is now, even if it is not on your immediate horizon….

LEARN MORE

Aligning Internal Cybersecurity with Third-Party Risk – ProcessUnity White Paper

Aligning Internal Cybersecurity Practices with Third-Party Risk Management With the recent increase in cyber attacks and new regulations on cybersecurity, you may be wondering how your organisation can bolster its cybersecurity efforts. As the threat landscape grows, so does your organisation’s need to develop a robust, cross-functional cybersecurity program. But where should you start? To…

LEARN MORE

TPRM and the Delicate Balance of the Supply Chain

Everywhere you look, people seem to be talking about it. No, we don’t mean Squid Game, we mean the supply chain. In the U.S. consumers (and many businesses) were long accustomed to taking the supply chain for granted. It seemed to work flawlessly in the background, ensuring items we want and need got onto shelves…

LEARN MORE

Complex Supply Chains: Digital Cyberspace and Concentration Risk

The sudden scarcity of common household items that began in the spring of 2020 has become a global struggle to move goods from ports and warehouses to customers’ homes and factory floors. The classic supply chain has one company delivering components needed by another for manufacturing: today there are multiple kinds of complex supply chains…

LEARN MORE

A New Model for Managing Third-Party Risk – John Bree, Supply Wisdom

Business today is a complex web of third-party relationships. At the same time, risks of disruption from these third parties are increasing in frequency and severity. With the pace of disruption accelerating and the causation spectrum expanding, the weaknesses and vulnerabilities of traditional risk management programs have been exposed. COVID has proved that legacy based…

LEARN MORE

Download your copy of Supply Wisdom’s Third-Party Risk Management eBook

Faced with increasing disruption risks from more sources in more locations, CROs are urgently exploring new strategies and technologies to mitigate third-party risk and ensure resiliency.  The Risk Officer’s Precise Guide to Accelerating Full-Stack Continuous Third-Party Risk Management eBook addresses this pressure on risk management executives, specifically: Problem: Legacy based TPRM practices are unable to effectively mitigate today’s risks of…

LEARN MORE

BlueVoyant Research Reveals Rise in Supply Chain Cybersecurity Breaches as Firms Struggle to Effectively Monitor Third-Party Cyber Risk

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem BlueVoyant today released the findings of its second annual global survey into third-party cyber risk management. The study reveals that 97% of firms surveyed have been negatively impacted by a cybersecurity breach…

LEARN MORE

Mergers and Acquisitions Risk and Cyber Security Points

With the pandemic causing economic uncertainty, it has been a “head-scratchingly prolific year” for mergers and acquisitions (M&A) and associated merger and acquisitions risks!. As organisations combine, what factors determine the success of a merger or acquisition? Ensuring all parties (owners, shareholders, employees and customers) understand the vision and upside merging companies plays an important role in…

LEARN MORE

Maturing your Third-Party Cyber Risk Management Program with Black Kite

Mismanaged or unmanaged supplier risks have an adverse impact on a company’s bottom line. Still, most third-party risk management programs aren’t as mature as we’d anticipate given the interconnectedness of today’s digital ecosystems. If mitigated, Third-party cyber incidents weigh astronomically on a company’s finances and reputation. Cybercriminals constantly update their approach and create new malware…

LEARN MORE