CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Newsroom

Register Now: Best Practices for Third-Party Risk Program Automation Webinar

Best Practices for Third-Party Risk Program Automation What does a best-practice program for Third-Party Risk Management look like? While every organisation has its own unique risk appetite, there are base requirements, processes and goals that all vendor-risk managers need to incorporate into their initiatives to eliminate as much risk as possible. Join DVV Solutions and…

LEARN MORE

New Automated Index Calculates Supply Chain Ransomware Susceptibility

The Ransomware Susceptibility Index analyses technical and financial data to determine likelihood of ransomware attacks on third-parties, vendors and business partners. Black Kite, DVV Solutions cybersecurity ratings partner, today released the first automated ransomware service that assesses the likelihood of a ransomware attack on organisations and their vendors, suppliers, and business partners. The Ransomware Susceptibility Index…

LEARN MORE

TPRM Webinar: Turning Cyber Risk Ratings Into Cyber Risk Reduction – Register Now

Are You Really Reducing Your Third Party Cyber Risk? Delivering both effective risk assessment and remediation within Third Party Risk Management programs is a constant challenge. Focus is naturally placed on assessing and monitoring higher-tier suppliers and more valuable relationships, but at what cost? Are organisation spending too much time and effort on cyber risk…

LEARN MORE

Vendor Risk Management & ESG Related Risk

The Emerging Importance of ESG-Related Risk Environmental, social, and governance (ESG) and its role in vendor risk management have gained prominence this past year as the awareness for environmental and social issues grows. ESG helps examine how an organisation contributes to and performs on environmental, social, and ethical challenges, and the overall governance of the organisation. ESG touches on issues ranging from human…

LEARN MORE

Seven Sins In Enterprise Cybersecurity That Will Cost You More In The Long Run

To better protect organisation’s in today’s cyber landscape, a seemingly infinite number of cybersecurity best practices and recommendations have evolved into more formal industry-wide frameworks and regulations. While some organisations have found themselves ahead of the curve, new policies create an obstacle for many, especially those ill-prepared for digitisation in the first place. Too many companies…

LEARN MORE

The Intersection of Third-Party Risk and Cybersecurity Program Management – Guest Blog

According to a recent BlueVoyant, Opinion Matters global study of 1,500 CISOs, CIOs, and CPOs, 29 percent say they have no way of knowing if cyber risk emerges in a third-party vendor; and only 22.5 percent say they monitor their entire supply chain. Without this key insight into their vendors, it’s no wonder that CISOs…

LEARN MORE

Nth Party Suppliers – Gaining a Toehold on Down Chain Providers

Supply chain sovereignty depends on a high degree of visibility in order to identify critical dependencies and then apply a consistent set of principles for monitoring of parallel (redundant) processes and other elements required for resilience across both inbound and outbound supply chains. How to accomplish this remains a nagging question at the practitioner level….

LEARN MORE

ProcessUnity VRM Essential Edition Brings Full-Featured TPRM Automation to Small and Mid-Size Organisations

ProcessUnity has today introduced ProcessUnity VRM Essential Edition, a new version of its flagship vendor risk management software aimed at helping smaller organisations identify and remediate risks posed by third-party service providers. This newest offering combines ProcessUnity’s award-winning automation tools with a complete baseline program that automates vendor onboarding, due diligence and ongoing monitoring. “Small and medium-sized…

LEARN MORE

Five Steps to Protect Your Supply Chain: A Board-Level Perspective

Last month, the cybersecurity industry faced its latest major attack through a third-party IT management software company, SolarWinds. This breach reinforces the fragility of not only the software supply chain, but  the entire third-party vendor ecosystem. As more information comes to the surface about the true depth and  breadth of the breach, it is glaringly…

LEARN MORE

Webinar Replay: Automating Supply Chain Risk Incident Actions and Response

Automating Supply Chain Risk Incident Actions and Response Many companies are increasing risk budgets in response to COVID-19’s wide-scale disruptions in 2020 and expanding their Risk Intelligence programs. Unfortunately, many widely used third-party risk management practices such as point-in-time assessments and one-time health reviews were ineffective as the situation and risks continued to change and…

LEARN MORE