REQUEST A DEMO

Blog

Third Party Risk Management (TPRM) Program Development – Pt 4 “Treating 3rd Parties as Trusted & Valued Partners”

Part 4: “Treating Third Parties as Trusted & Valued Partners” This TPRM blog series, compiled by experienced CSO, Bob Maley of NormShield Cybersecurity, has been designed to help CISOs and other risk management practitioners examine their programs from a unique perspective – one in which the objective problem your organisation is trying to solve takes center…

LEARN MORE

Third Party Risk Management (TPRM) Program Development – Part 3 “Strengthening Your Strategy”

Part 3: “Strengthening Your Strategy” This series has been designed to help CISOs and other risk management practitioners examine their programs from a unique perspective – one in which the objective problem your organisation is trying to solve takes center stage and risk managers can effectively respond as that problem morphs over time. This is the…

LEARN MORE

Third Party Risk Management (TPRM) Program Development – Part 2 “Knowing Your Ground”

Part 2: – “Knowing Your Ground” This TPRM blog series, compiled by experienced CSO, Bob Maley of NormShield Cybersecurity, has been designed to help CISOs and other risk management practitioners examine their programs from a unique perspective – one in which the objective problem your organisation is trying to solve takes center stage and risk managers…

LEARN MORE

Third Party Risk Management (TPRM) Program Development – Part 1 “Doing it Right”

This TPRM blog series, compiled by experienced CSO, Bob Maley of NormShield Cybersecurity, has been designed to help CISOs and other risk management practitioners examine their programs from a unique perspective – one in which the objective problem your organisation is trying to solve takes center stage and risk managers can effectively respond as that problem…

LEARN MORE

Happy One Year GDPR Enforcement Day

It’s hard to believe it’s been one year since the GDPR enforcement took effect (May 25, 2018). For many, the honeymoon (or “honeydo”) hasn’t quite worn off yet, as organisations are  still trying to ensure they meet some level of conformity to the most encompassing privacy regulation to date. There are also those who will…

LEARN MORE

Verizon Data Breach Investigations Report 2019: What Are the Third-Party Risk Implications?

Prevalent Inc. Intelligence Analyst, Shawn Stefanick, provides analysis on Verizon’s Data Breach Investigations Report (DBIR) through the lens of how top third-party vulnerabilities are perpetuating breaches, and what preventative measures can be put in place. The Verizon DBIR 2019 was released on May 8th, and with it comes the annual treasure trove of lessons, use…

LEARN MORE

CEFPRO Risk Insights: Third Party Risk and the Cloud – Interview with Sean O’Brien, MD

Ahead of DVV Solutions sponsorship of the 4th Annual CEFPRO Vendor & Third Party Europe on 18th & 19th June, Sean O’Brien – Managing Director, DVV Solutions – spoke with Risk Insights magazine for a quick-fire interview on what to expect from our panel discussion on “Ensuring effective controls for cloud providers to understand where…

LEARN MORE

The Realities of Raising Fraud Awareness

If you could print $200 million on your home printer each year, how would it affect the world economy? If all humans could avoid physical contact with each other for two weeks, would the common cold be eradicated? If every person on earth aimed a laser pointer at the moon, would the moon change color?…

LEARN MORE

Cyber readiness levels stall as attacks reach new intensity – Hiscox Cyber Readiness Report 2019

Sharp increase in the number and cost of cyber attacks    Hiscox has released it third annual Cyber Readiness Report, providing an up-to-the-minute picture of the cyber readiness of organisations across the US and Europe, as well as a blueprint for best practice in the fight to counter the ever-evolving cyber threat. The report finds…

LEARN MORE

Third-Party Risk – Moving from Sharing is Scary to Sharing is Caring

Leveraging Reusable Content to Expedite Third-Party Risk Reduction Efforts Storing your information security content and associated artifacts in a shareable network will stop the pandemonium, opening opportunities to reduce risk, and face resiliency head on. “Sharing is caring!” We all heard this phrase growing up and in today’s information security world it still proves to…

LEARN MORE