REQUEST A DEMO

Newsroom

4th Party Vendor Breach Strikes Again

4th Party Vendor Breach Strikes Again Security can’t be looked at only inside the firewall; it must be accounted for throughout an organization’s entire business network Last week’s Ticketmaster breach is a classic example of the challenges companies face to effectively manage vendor risk.  Very few companies manage their online ticket sales.  That job is left…

LEARN MORE

Mind the (risk intelligence) gap

5 keys to managing Fourth Party cybersecurity risk Author: Sean O’Brien CTPRP, Director, DVV Solutions If GDPR hasn’t raised the stakes and drawn attention to the risks in the data supply chain then maybe nothing will. The mix of media attention, ICO & GDPR guidelines and the messaging produced by GRC solution providers over the…

LEARN MORE

What we learnt from CeFPro Vendor & Third Party Risk EMEA 2018

Key take-aways from CeFPro Vendor and Risk EMEA 2018 Sean O’Brien, Managing Director at DVV Solutions offer his thoughts and ideas on the state of Third Party Risk Management in the UK and Europe, and his key take-aways from CeFPro Vendor & Third Party Risk 2018. I was proud to represent DVV Solutions at the…

LEARN MORE

Industry Interview – GDPR, Late to the Third Party?

Industry Interview with Sean O’Brien, Managing Director, DVV Solutions    Briefing magazine interviews Sean O’Brien to help information security and procurements executives in the Legal sector better understand the operational impact of GDPR and Third Party data processors in the data supply chain. Sean discusses the key issues surrounding GDPR for the Legal IT sector…

LEARN MORE

Briefing Frontiers: Information Security, Privacy & Protection Thurs 5th July 2018

Join Us at Briefing Frontiers DVV Solutions are pleased to announce their sponsorship of a very exciting instalment of Briefing Frontiers on Information Security, Privacy and Protection – taking place in Central London on Thursday 5th July. In this year’s Briefing Legal IT Landscapes report, info-sec technologies has rocketed up respondent’s agendas as a top…

LEARN MORE

GDPR Deadline Day – Have you addressed your Third Party Data Processor Risk?

GDPR and Third Party Data Processor Risk   Today sees the biggest change to data protection law in 20 years kick in. The EU General Data Protection Regulation (GDPR). You know the risks. Any breach of Personally Identifiable Information (PII) can result in new penalties of fines of up to 4% of Annual Global Revenue or…

LEARN MORE

9 Keys to Successful Third Party Risk Management

9 Keys to Successful Third Party Risk Management   With risks from IT outsourcing increasing and well publicised regulatory pressure and penalties – such as those posed by GDPR and PCI DSS – it has never been more important to evaluate and mitigate risks from the data supply chain and downstream data processors. Whether you’re…

LEARN MORE

DVV Solutions renews Cyber Essentials accreditation for 3rd consecutive year

Third year of Cyber Essentials accreditation for Third Party Risk experts DVV Solutions, leading experts in Third Party Risk Management, are proud to confirm is has been certified to the UK Government’s Cyber Essentials Scheme for the 3rd consecutive year. In conjunction with the Information Assurance for Small & Medium Enterprises (IASME) and the Information…

LEARN MORE

GDPR – Not long to go. Have you addressed Third Party Data Processor Risk?

GDPR and Third Party Data Processor Risk On May 25th 2018 the biggest change to data protection law in 20 years will kick in. The EU General Data Protection Regulation (GDPR). You know the risks. Any breach of Personally Identifiable Information (PII) can result in new penalties of fines of up to 4% of Annual Global Revenue or…

LEARN MORE

Bomgar Publishes 2018 Privileged Access Threat Report

Bomgar Publishes 2018 Privileged Access Threat Report Bomgar, a leader in identity and access management solutions for privileged users, today launched the 2018 Privileged Access Threat Report. The global survey explores the visibility, control, and management that IT organizations in the U.S. and Europe have over employees, contractors, and third-party vendors with privileged access to…

LEARN MORE