CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Blog

Understanding The Frailty Of The Software Supply Chain

In December 2020, the cybersecurity industry faced its latest attack – SolarWinds. This hack reinforces the frailty of not only the software supply chain but the third-party vendor ecosystem. As more information is uncovered, it is becoming clear that this extensive ecosystem of vendors is the gateway for attackers to move laterally from network-to-network. Tackling…

LEARN MORE

Webinar Replay – Generate Real Scale & Results in your Third Party Cyber Risk Management Feb 2021

Generate Real Scale & Results in your Third Party Cyber Risk Management Whether it is the availability of resources, time or necessary skills, delivering both assessment and remediation of cyber risk within Third Party Risk Management programs is a constant challenge. Focus is naturally placed on assessing and monitoring higher tier suppliers and more valuable…

LEARN MORE

Assure Supply Chain Transparency: Ethical Sourcing and Nth Party Providers

Supply chains are critical to business, but the lack of transparency across the links in your chain can lead to unwanted consequences. The Shared Assessments Financial Services Vertical Strategy Group has been discussing how to ensure ethical sourcing and protect for human rights issues in the supply chain. Almost every business walks a fine line between the…

LEARN MORE

Are Security Ratings Services Really Worth It For SMBs?

Let’s be honest: SMBs haven’t made the big breach headlines over the past few years. However, when we look at the statistics, the numbers tell a different story. SMBs make a critical portion of these breaches.  With their valuable position in the economy and growing risk of attacks on their ecosystems, we put SMBs under the…

LEARN MORE

The Cost of Faulty Risk Management – and How to Avoid It

Fines resulting from poor risk management controls are becoming commonplace in the financial industry – and this new trend is just as expensive as it is avoidable. Recently JPMorgan was charged $250 million over inadequate risk management in its wealth management business. This follows the news that Citigroup was fined for major deficiencies with their risk program, and USAA faced a…

LEARN MORE

Go Beyond Cyber and Financial Assessments: Here’s How to Enhance Your TPRM Program for 2021 and Beyond

Financial and cyber threats are rightfully a top concern for businesses today, but third-party and global business disruption risks go far beyond cyber and financial concerns. When you compound financial and cyber risks with the ever-changing business environment, geopolitical events and increasingly frequent severe weather events, a TPRM program that only periodically assesses financial and…

LEARN MORE

Raising awareness of the importance of safeguarding consumer data as a 2021 Data Privacy Day Champion

This year’s initiative emphasises cultivating trust among consumers by adopting data privacy frameworks and promoting transparency around data collection practices DVV Solutions today announced its commitment to Data Privacy Day by registering as a “Data Privacy Day Champion” for the 2021 campaign. Data Privacy Day is a global effort — taking place annually on January 28th…

LEARN MORE

Research reveals more than a third of UK organisations cannot identify if cyber risks emerge in supply chain

  DVV Solutions cyber risk and remediation managed service partner, BlueVoyant, has released the UK findings of its global study into third-party cyber risk management. The study reveals that 82% of UK organisations surveyed had experienced a cybersecurity breach that originated from vulnerabilities in their vendor ecosystem in the past 12 months, and the average…

LEARN MORE

3 Ways To Make Your Vendor Lifecycle More Efficient – BitSight Guest Blog

During this dynamic and stressful workplace environment 2020 has brought us, finding the most efficient ways to perform in your job has never been more important. When it comes to managing your vendor lifecycle, there are three ways you can implement more efficient processes to save time and money for your business.   Staying competitive with your…

LEARN MORE

10 Questions To Ask When Securing Your Supply Chain – Guest Blog

According to CISOs interviewed at the 2020 RSA Conference, supply chain attacks are the most dangerous threats following ransomware. IBM Security’s recent report [1] emphasizes third-party involvement (a.k.a supply chain) as an amplifying factor to the overall cost of a breach, increasing the dollar amount by more than $200,000.   Let’s admit, supply chain security…

LEARN MORE