Risk Management Blog and Articles

March 21, 2017
New York’s DFS Cybersecurity Regulations in a Nutshell

New York’s DFS Cybersecurity Regulations in a Nutshell

We break down the new DFS Cybersecurity Regulations and what they mean for your vendor risk management program.
June 9, 2021
network approach vendor risk management

The Network Approach: Making Vendor Risk Management Easier and More Efficient

We explore the challenges of the traditional, manual approach to VRM and analyze how a network approach can make thing easier.
May 19, 2021
third party risk management strategy guide

The Network Approach to Third Party Risk Management – Strategy Guide

We explore third party risk management challenges, solutions, and why our network approach is unmatched by other systems.
November 3, 2020
Netskope Case Study

Netskope Case Study: 25% Increased Efficiency in Security Questionnaires with a 7x ROI

Learn how Netskope went from a manual, ad-hoc process to a streamlined, consistent workflow to easily share their security posture with their customers.
July 2, 2020
NERC-CIP-013-and-the-Impact-of-New-Regulations-in-the-Industry

NERC CIP-013 and the Impact of New Regulations in the Industry

In Utilities, there's a saying that “Safety is everybody’s business”. At some level, cybersecurity is becoming a part of everyone’s job too.
June 18, 2020
NERC-CIP-013-1-Effective-Date

NERC CIP-013 Requirements and CIP-013-1 Implementaiton Guidance

As of October 1st, 2020 energy organizations will have to focus on addressing specific third-party cybersecurity risks. This blog looks at some key points of the standard and how TPRM technology can help complyi.
July 31, 2017
Morningstar-Uptake-Discuss-Vendor-Risk-Management-Anders-Norremo

Morningstar & Uptake Discuss Vendor Risk Management Best Practices With Anders Norremo

Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey, 63% of all data breaches stem from vendor related attacks. IT experts predict that number of vendor related attacks will rise, as companies increasingly resort to outsourcing for innovation and expanded services. On July 19th, Anders Norremo, CEO of ThirdPartyTrust, moderated a panel of two […]
July 27, 2017
MORNINGSTAR SECURITY SUMMIT VENDOR RISK MANAGEMENT

At Morningstar Security Summit, Experts Discuss Vendor Risk Management

We discussed best practices in cybersecurity and third-party risk assessment at the Morningstar Security Summit on June 26th.
July 6, 2021
mercedes-benz-data-exposure-third-party-vendor

Mercedes-Benz Suffers Cloud Data Exposure via Third Party Vendor

Yet another security incident shines a spotlight on third party risk. Here's what happened to Mercedes-Benz and how to prevent these types of issues.