CONTACT US
Third Party Risk Management - Consultancy, Assessment & Advisory

Newsroom

Forrester Ranks Prevalent a Leader in Cybersecurity Risk Ratings Solutions

Prevalent “leads the pack with a third-party risk management platform” DVV Solutions technology partner – Prevalent, Inc, the leader in third party risk management – has been recognised by Forrester as a “Leader”  in their latest research report: The Forrester New Wave™: Cybersecurity Risk Ratings Solutions, Q4 2018. The report recognises Prevalent as a Leader…

LEARN MORE

Connecting Risk and Reward at UK Risk Network

Illustrating the value of a robust TPRM framework for the Financial sector DVV Solutions, specialists in Third Party Risk Management, are proud to announce their sponsorship of UK Risk Network – one of a series of forums for the development of Enterprise Risk strategy development across the European Financial sector. Held at Sopwell House, Hertfordshire,…

LEARN MORE

Missing the point? Should cyber insurance cover GDPR fines?

Should cyber insurance cover GDPR fines? I see the interesting debate around whether GDPR fines should be covered within corporate cyber insurance policies has raised its head again. See Law360’s GDPR Fines May Be Uninsurable, Broker Warns and Are GDPR Fines Insurable? UK Watchdog Won’t Say With increasing regulation and scrutiny placed on organisations and…

LEARN MORE

Expect the Unexpected: 5 Keys to Managing Third Party GDPR Risk

Expect the Unexpected: 5 Keys to Managing Third Party GDPR Risk As the European Union’s (EU’s) General Data Protection Regulation (GDPR) May 25 effective date approached this spring, its sweeping compliance requirements socked companies with major surprises. The regulation’s global jurisdictional reach, EU-specific definition of “sensitive data,” steep penalties, hefty compliance costs, and applicability to…

LEARN MORE

3rd Party Vendor Breach Leaves Thousands of “Vulnerable People” at Risk

A security incident at The Pennsylvania Department of Corrections has compromised the personal information of a seemingly “vulnerable population” Recently, Accreditation, Audit, and Risk Management Security LLC, an online systems vendor for the Pennsylvania Department of Corrections, suffered a data breach that exposed the Personally Identifiable Information (PII) – including names, Social Security Numbers, medical…

LEARN MORE

Digital Transformation Gives Rise to 3rd Party Vendor Vulnerabilities

3rd party vendor relationships present plenty of opportunities for cybercriminals   Digital transformation is imperative for any business striving to deliver value to customers and remain relevant in fiercely competitive landscapes. Whether moving an existing infrastructure to a cloud platform or incorporating IoT devices and analytics into business models, these technologies enable organisations to increase…

LEARN MORE

Shared Assessments launches new CTPRA certification for Third Party Risk Assessors

New Third Party Risk Assessor Certification   The Shared Assessments Program announces an expansion to its certification program to include the new Certified Third Party Risk Assessor (CTPRA) designation. This individual certification validates skills and knowledge within specific IT risk controls that an experienced assessor needs in order to perform a thorough risk assessment of…

LEARN MORE

Shared Assessments White Paper: Principles of Third Party Contract Development, Adherence & Management

Shared Assessments has released it’s latest White Paper – Building Best Practices: Third Party Contract Development, Adherence & Management. This paper documents best practices for streamlining Third Party contract development, approval, exceptions and addendums processes, examines the need for actionable contracts and shows how they can be written and managed across the relationship lifecycle from both…

LEARN MORE

Turning the Third Party risk tables – from the Assessor to the Assessed!

Article written by Sean O’Brien CTPRP, Director, DVV Solutions A common question I receive from clients as part of Third Party risk management (TPRM) program development is the best way to manage the inbound requests to complete risk assessments from their own clients. My answer is very simple. “Practice what you preach”. Treat client requests…

LEARN MORE

4th Party Vendor Breach Strikes Again

4th Party Vendor Breach Strikes Again Security can’t be looked at only inside the firewall; it must be accounted for throughout an organization’s entire business network Last week’s Ticketmaster breach is a classic example of the challenges companies face to effectively manage vendor risk.  Very few companies manage their online ticket sales.  That job is left…

LEARN MORE