illustration blog

Subscribe to our ThirdPartyTrust blog

Get the latest posts in your inbox!

Morningstar & Uptake Discuss Vendor Risk Management Best Practices With Anders Norremo

Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey,…