Skip to content
ThirdPartyTrust
Third Party Risk Management – Simplified to Scale
ThirdPartyTrustThirdPartyTrust
  • Platform
    • Overview
    • For Enterprises
    • For Third-Parties
  • Pricing
  • Industries
    • Overview
    • Energy Industry
    • Financial Services
    • Healthcare and Hospitals
    • Legal
    • Life Sciences
    • Manufacturing Industry
    • Retail Industry
    • Technology Industry
    • Other Industries
  • Resources
    • Blog
    • Case Studies
    • Videos
    • Product Security
    • API
    • Events
    • Resource Center
  • About Us
    • Who We Are
    • Careers
    • Contact Us
    • Partners
  • Login
  • Platform
    • Overview
    • For Enterprises
    • For Third-Parties
  • Pricing
  • Industries
    • Overview
    • Energy Industry
    • Financial Services
    • Healthcare and Hospitals
    • Legal
    • Life Sciences
    • Manufacturing Industry
    • Retail Industry
    • Technology Industry
    • Other Industries
  • Resources
    • Blog
    • Case Studies
    • Videos
    • Product Security
    • API
    • Events
    • Resource Center
  • About Us
    • Who We Are
    • Careers
    • Contact Us
    • Partners
  • Login

Category Archives: Blog

Designing your Third-Party Risk Management program: key essentials

BlogBy Lily HwangDecember 13, 2019Leave a comment

When you are deciding to create a framework for your Third-Party Risk Management Program you need to take the following into consideration:

creating an industry

LS-ISAO Annual Member Gathering: A collaborative approach to Vendor Risk

BlogBy Sabrina PagnottaSeptember 10, 2019Leave a comment

Last Monday, (9/30) at the LS-ISAO Annual Member Gathering, we had the privilege to help organize a panel about the importance of a legal specific set of controls to help manage your third-party risk management program.

Experts share important metrics for assessing vendor risk

BlogBy Sabrina PagnottaOctober 10, 2018Leave a comment

Metrics drive the measure of progress and stand as benchmarks during any assessment, audit or review process. They are the life blood of reporting, but when it comes to vendor risk management, it is not as straight forward as you might think.

data-is-the-new-leak

Data is the New Oil and Breaches are the New Spills; So Where is the Leak?

BlogBy Sabrina PagnottaJuly 6, 2018Leave a comment

The former CEO of Intel, Brian Kzranich said last month, “Data, I look at it as the new oil. It’s going to change most industries across the board. Oil changed the world in the 1900s. It drove cars, it drove the whole chemical industry,” Krzanich explains.

gdpr-third-party-risk

Guest Blog: A GDPR Primer to Meet the Deadline Next Week

BlogBy Sabrina PagnottaMay 23, 2018Leave a comment

Discussions on privacy laws have taken front and center in recent weeks as GDPR (General Data Protection Regulation) begins to be enforced by European Union (EU) member states on May 25, 2018.  As we have been discussing for a while, there is confusion as data collectors try to figure out the impact of this legislation.  There is…

gdpr-guest-blog

GDPR and the Integration of Third-Party Service Providers

BlogBy Sabrina PagnottaMay 4, 2018Leave a comment

There remains a significant amount of mis-information and utter chaos regarding the continued use of trusted third parties in support of business operations.

OnRamp Insurance Conference

How is Cyber Shaping the Insurance Industry? Learn From Pros at Allstate, Trustmark and BCSF

BlogBy Sabrina PagnottaApril 23, 2018Leave a comment

We participated in a panel at the OnRamp Insurance Conference. Here’s some insight into how cybersecurity is shaping the insurance industry.

rocio-baeza-interview

TPT Infosec Interviews: Rocio Baeza, CEO CyberSecurityBase

BlogBy Sabrina PagnottaMarch 27, 2018Leave a comment

Hi, everyone. This is Jeff Spetter from ThirdPartyTrust and I had the great pleasure of speaking with Rocio Baeza, CEO of CyberSecurityBase. Here’s a recap and audio of the interview.  Rocio Baeza the CEO and Founder of CyberSecurityBase, helping rising tech companies get started with information security. The mission is to simplify security, teach that model,…

inside mobile app attack

OWASP Chicago February Meetup Summary and Presentations

BlogBy Sabrina PagnottaMarch 5, 2018Leave a comment

The evening at the OWASP Chicago meetup was filled with really informative content in a couple of areas all tied to application security. Here’s a recap.

Emerging Technology, Unknown Risks: DePaul University’s Fourth Annual Cyber Risk Conference Part Two

BlogBy ThirdPartyTrustDecember 20, 2017Leave a comment

Panelists answer audience questions at DePaul University’s Fourth Annual Cyber Risk Conference. Including what constitutes a vendor and risk profiles.

1
234
…56789
Go to Top
This website uses cookies to improve your experience. Privacy Policy
Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.