14th July 2020
More than two-thirds of companies are cutting corners when it comes to understanding inherent risk within their third-party due diligence It is no secret that inherent risk assessments are crucial to third-party risk management success, but are they being conducted? During a recent IT GRC webinar, Automating Your Third-Party Risk Management Program, attendees were asked…
LEARN MORE30th June 2020
As the only strategy report in the cyber space providing guidance from a technical, financial, and compliance perspective the NormShield Strategy Report provides a clear and concise guide to reduce cyber risk mitigation and remediation into one single report of actionable steps. We all know effective risk management starts with an effective risk model….
LEARN MORE22nd June 2020
As the only in-house cyber risk ticketing platform, NormShield Ticketing automates workflow to remediate continuous cyber risk monitoring issues. Here is why ticketing is effective in third-party risk management (TPRM) and how NormShield’s new system can help. Businesses strive to be more organised, focused and efficient. This productivity has a direct impact on costs,…
LEARN MORE5th June 2020
Everyone is familiar with the utility of the famous Swiss army knife; a penknife housing several blades and other tools such as files, scissors, and screwdrivers. The Shared Assessments’ Standardised Controls Assessment (previously known as the Shared Assessments’ Agreed Upon Procedure – or “AUP”) is acquiring a similar reputation in assurance circles as it’s been reported to…
LEARN MORE29th May 2020
According to an Opus and Ponemon Institute study, 59% of companies have experienced a data breach caused by one of their vendors or Third Parties — while only 16% claim they effectively mitigate Third-Party risks. Don’t be a part of these alarming statistics: In order to protect your organisation’s valuable information, it’s critical that you set…
LEARN MORE25th May 2020
As we see an ever-increasing stream of high-profile data breaches and regulatory fines Sean O’Brien, Director DVV Solutions, takes a look at one of the most common weak links in law firms’ data security and GDPR compliance programs – the risks posed by third parties and suppliers. The EU General Data Protection Regulation (GDPR) and…
LEARN MORE15th May 2020
As cloud services increase in popularity, a worrying cybersecurity trend has emerged. According to the 2020 Trustwave Global Security Report, the volume of attacks on cloud services more than doubled in 2019 and accounted for 20% of investigated incidents. Although corporate and internal networks remain the most targeted domains, representing 54% of incidents, cloud environments are…
LEARN MORE12th May 2020
Patent covers Supply Wisdom’s proprietary technology & methodology for quantifying risk associated with Third Parties & geographic locations. Supply Wisdom, the leader in real-time and continuous risk intelligence, announced today that the US Patent and Trademark Office has issued Patent No. 10,643,165B2 for its risk monitoring solution. The patent covers the technology and methodology used to…
LEARN MORE5th May 2020
Study puts POS cybersecurity under the spotlight When people talk about cybersecurity risks, the first area that normally comes to mind is malware. Some might even consider that it’s the worst event that can happen, as it normally indicates that a malicious actor has already bypassed the layers of security and now has free-reign to…
LEARN MORE5th May 2020
Complexity and uncertainty in the supply chain have increased exponentially in recent months leading to higher risk related to all aspects of third parties and supply chains. With the economic downturn expected to continue due to the destabilising impacts of COVID-19, members of the Shared Assessments’ Vertical Strategy Groups and Continuous Monitoring Working Groups collaborated…
LEARN MORE