CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Blog

Guest Blog – Cutting Corners: Most Companies Conduct Inherent Risk Assessments on Less Than 40% of Their Vendors

More than two-thirds of companies are cutting corners when it comes to understanding inherent risk within their third-party due diligence It is no secret that inherent risk assessments are crucial to third-party risk management success, but are they being conducted? During a recent IT GRC webinar, Automating Your Third-Party Risk Management Program, attendees were asked…

LEARN MORE

New NormShield Strategy Report provides Simple Guide to Fix your Cyber Rating

As the only strategy report in the cyber space providing guidance from a technical, financial, and compliance perspective the NormShield Strategy Report provides a clear and concise guide to reduce cyber risk mitigation and remediation into one single report of actionable steps.   We all know effective risk management starts with an effective risk model….

LEARN MORE

NormShield Ticketing System Simplifies Third Party Cyber Risk Remediation

As the only in-house cyber risk ticketing platform, NormShield Ticketing automates workflow to remediate continuous cyber risk monitoring issues. Here is why ticketing is effective in third-party risk management (TPRM) and how NormShield’s new system can help.   Businesses strive to be more organised, focused and efficient. This productivity has a direct impact on costs,…

LEARN MORE

Why the Shared Assessments SCA is the “Swiss-Army Knife” in Your Third Party Risk Assessment Toolbox

Everyone is familiar with the utility of the famous Swiss army knife; a penknife housing several blades and other tools such as files, scissors, and screwdrivers. The Shared Assessments’ Standardised Controls Assessment (previously known as the Shared Assessments’ Agreed Upon Procedure – or “AUP”) is acquiring a similar reputation in assurance circles as it’s been reported to…

LEARN MORE

Vendor Contract Do’s and Don’ts – BitSight Guest Blog

According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or Third Parties — while only 16% claim they effectively mitigate Third-Party risks.   Don’t be a part of these alarming statistics: In order to protect your organisation’s valuable information, it’s critical that you set…

LEARN MORE

GDPR’s 2nd Birthday – Are You Late To The Third Party?

As we see an ever-increasing stream of high-profile data breaches and regulatory fines Sean O’Brien, Director DVV Solutions, takes a look at one of the most common weak links in law firms’ data security and GDPR compliance programs – the risks posed by third parties and suppliers. The EU General Data Protection Regulation (GDPR) and…

LEARN MORE

Report Shows Cyber Attacks on Cloud Services Have Doubled

As cloud services increase in popularity, a worrying cybersecurity trend has emerged. According to the 2020 Trustwave Global Security Report, the volume of attacks on cloud services more than doubled in 2019 and accounted for 20% of investigated incidents. Although corporate and internal networks remain the most targeted domains, representing 54% of incidents, cloud environments are…

LEARN MORE

Supply Wisdom Granted Patent for Real-time & Continuous Risk Monitoring Solution

Patent covers Supply Wisdom’s proprietary technology & methodology for quantifying risk associated with Third Parties & geographic locations.   Supply Wisdom, the leader in real-time and continuous risk intelligence, announced today that the US Patent and Trademark Office has issued Patent No. 10,643,165B2 for its risk monitoring solution. The patent covers the technology and methodology used to…

LEARN MORE

POS Cybersecurity Under The Spotlight: BitSight Research Reveals Vulnerabilities in Point of Sales Systems

Study puts POS cybersecurity under the spotlight When people talk about cybersecurity risks, the first area that normally comes to mind is malware. Some might even consider that it’s the worst event that can happen, as it normally indicates that a malicious actor has already bypassed the layers of security and now has free-reign to…

LEARN MORE

Third Party Financial Health A Leading Indicator for All Areas of Risk – Output from Shared Assessments’ Working Groups

Complexity and uncertainty in the supply chain have increased exponentially in recent months leading to higher risk related to all aspects of third parties and supply chains. With the economic downturn expected to continue due to the destabilising impacts of COVID-19, members of the Shared Assessments’ Vertical Strategy Groups and Continuous Monitoring Working Groups collaborated…

LEARN MORE