Risk Management Blog and Articles

April 15, 2021
story of thirdpartytrust

From Entrepreneur to CEO: How to be the wearer of many hats

Tired of gigantic spreadsheets with security questions, I set out to fix third-party risk assessments. This is the story of ThirdPartyTrust.
April 22, 2021
Building the TPRM Business Case

Building the TPRM Business Case

When you're tired of tracking gigantic spreadsheets and chasing vendors via email to complete your assessments, it's time to build the TPRM business case.
May 5, 2021
Document-Sharing-Management-ThirdPartyTrust

Introducing Document Sharing Management For Your Next Security Review

Learn all about our new Document Sharing Management feature and how to add an NDA to your security profile shared with customers.
May 10, 2021

Cyberattack on Oil Pipeline Raises Security Concerns

Colonial Pipeline was the victim of a cyberattack. Third party risk management and NERC CIP regulation can help to prevent cyberattacks.
May 19, 2021
third party risk management strategy guide

The Network Approach to Third Party Risk Management – Strategy Guide

We explore third party risk management challenges, solutions, and why our network approach is unmatched by other systems.
May 27, 2021

3 reasons why vendor risk management is more urgent than ever

If you haven’t formalized a vendor risk management program yet or it's not mature enough, here's why you should do it ASAP.
June 2, 2021
security risk assessment requirements

Building Requirements for a Customized Security Risk Assessment

The traditional approach often subjects all vendors to the same questions. How to customize the requirements in your security risk assessment?
June 2, 2021

Latest Cyberattacks Threaten American Summer Lifestyles

Over Memorial Day weekend, the US outpost of the world’s largest meat processing company, JBS, was the victim of a cyberattack.
June 4, 2021
beacon tour thirdpartytrust

Beacon for Third Party Vendors Guided Tour Released

This Beacon tour shows third party vendors how to automate the TPRM and security risk assessment response process.