CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Newsroom

Complex Supply Chains: Digital Cyberspace and Concentration Risk

The sudden scarcity of common household items that began in the spring of 2020 has become a global struggle to move goods from ports and warehouses to customers’ homes and factory floors. The classic supply chain has one company delivering components needed by another for manufacturing: today there are multiple kinds of complex supply chains…

LEARN MORE

A New Model for Managing Third-Party Risk – John Bree, Supply Wisdom

Business today is a complex web of third-party relationships. At the same time, risks of disruption from these third parties are increasing in frequency and severity. With the pace of disruption accelerating and the causation spectrum expanding, the weaknesses and vulnerabilities of traditional risk management programs have been exposed. COVID has proved that legacy based…

LEARN MORE

Download your copy of Supply Wisdom’s Third-Party Risk Management eBook

Faced with increasing disruption risks from more sources in more locations, CROs are urgently exploring new strategies and technologies to mitigate third-party risk and ensure resiliency.  The Risk Officer’s Precise Guide to Accelerating Full-Stack Continuous Third-Party Risk Management eBook addresses this pressure on risk management executives, specifically: Problem: Legacy based TPRM practices are unable to effectively mitigate today’s risks of…

LEARN MORE

Black Kite Platform Wins Dual Risk Management Innovation Awards

Black Kite, the standard in third-party cyber risk ratings, has won the CISO Choice Award for Risk Management for a second consecutive year. Granted by a distinguished panel of judges from the CISOs Connect community, the win comes just weeks after Black Kite was named the 2021 Risk Management Innovation of the Year by the…

LEARN MORE

Webinar: Best Practices for Third-Party Risk Program Automation – 16 Nov 2021

What does a best-practice program for Third-Party Risk Management look like? While every organisation has its own unique risk appetite, there are base requirements, processes and goals that all vendor-risk managers need to incorporate into their initiatives to eliminate as much risk as possible. Join our latest webinar with ProcessUnity and see how proven TPRM…

LEARN MORE

BlueVoyant Research Reveals Rise in Supply Chain Cybersecurity Breaches as Firms Struggle to Effectively Monitor Third-Party Cyber Risk

Vendor risk visibility and continuous third-party monitoring remains concerningly low despite heightened awareness of the risk and substantial budget increases to tackle the problem BlueVoyant today released the findings of its second annual global survey into third-party cyber risk management. The study reveals that 97% of firms surveyed have been negatively impacted by a cybersecurity breach…

LEARN MORE

Mergers and Acquisitions Risk and Cyber Security Points

With the pandemic causing economic uncertainty, it has been a “head-scratchingly prolific year” for mergers and acquisitions (M&A) and associated merger and acquisitions risks!. As organisations combine, what factors determine the success of a merger or acquisition? Ensuring all parties (owners, shareholders, employees and customers) understand the vision and upside merging companies plays an important role in…

LEARN MORE

Maturing your Third-Party Cyber Risk Management Program with Black Kite

Mismanaged or unmanaged supplier risks have an adverse impact on a company’s bottom line. Still, most third-party risk management programs aren’t as mature as we’d anticipate given the interconnectedness of today’s digital ecosystems. If mitigated, Third-party cyber incidents weigh astronomically on a company’s finances and reputation. Cybercriminals constantly update their approach and create new malware…

LEARN MORE

Shared Assessments Releases 2022 Third Party Risk Management Toolkit

Standardised Excellence To Meet Today’s Risk Environment Shared Assessments has released the 2022 Third Party Risk Management Toolkit. The tools included in this update are: Vendor Risk Management Maturity Model (VRMMM): Self-assessment of TPRM Programs Standardised Information Gathering Questionnaire (SIG): Efficient Vendor Risk Assessments Standardised Control Assessment (SCA): Validation of Third Party Controls Data Governance…

LEARN MORE

UK PRA Guidelines: New Strategies for Operational Resiliency and Supplier Risk Management

It goes without saying that operational resiliency and supplier risk management go hand in hand. Organisations need to adapt, respond to, and recover from disruptions that occur both internally and externally in order to be successful. In recent years, financial regulators globally have been putting a stronger emphasis on operational resiliency and business continuity, leading to an influx of new…

LEARN MORE