Risk Management Blog and Articles

January 28, 2021
understanding supply chain data breaches

Understanding Supply Chain Data Breaches in the Aftermath of SolarWinds

We take a look at the different sides of supply chain data breaches and provide 3 practical tips to secure the extended enterprise.
February 4, 2021
consistency james bond

007 Life Lessons Through The Verizon Breach Report: #7 Consistency

In some organizations, cybersecurity is still approached as a tactical security problem, instead of as a strategic risk problem. Here's a lesson on consistency from James Bon
February 11, 2021
scale your vendor security response process with a centralized profile

How to Scale Your Vendor Security Response Process

What if there was a better way to share verified vendor information to economize the security response process and reduce workload redundancies?
February 18, 2021
email security vulnerabilities

Email Security Vulnerabilities Causing Most Cyber Insurance Claims

Protecting email accounts goes beyond passwords. Here are 5 tips to prevent email security vulnerabilities from affecting your organization.
February 25, 2021

Pinnacol Assurance Case Study: Automating communication with vendors

Pinnacol was looking to upgrade the manual process of communicating with their vendors. Learn how they automated the request of security documents like SOC2 or SIG Lite with ThirdPartyTrust.
March 4, 2021
digital transformation and third-party risk management

Digital Transformation & Third-Party Risk Management, Closer than Ever

According to Gartner, 69% of Boards of Directors accelerated their digital transformation initiatives following COVID-19 disruption last year. So how does this impact TPRM?
March 25, 2021
Major-Releases-in-the-ThirdPartyTrust-Platform

Starting off 2021 with Major Releases in the ThirdPartyTrust Platform

Our Head of DevOps shares all the details about our Kubernetes cluster and some exciting major releases in the ThirdPartyTrust platform.
April 2, 2021
selective sharing thirdpartytrust

Selective Sharing: Customizing the vendor security response process

We’re taking the vendor security response process a step further by introducing the Selective Sharing functionality.
April 7, 2021
TPRM-investment-paying-off

How to Prove Your Organization’s TPRM Investment is Paying Off

Your TPRM program was funded and it's fully operational. How to prove its value to the C-suite? Here are three practical tips from a CISO.