Pinnacol was looking to upgrade the manual process of communicating with their vendors. Learn how they automated the request of security documents like SOC2 or SIG Lite with ThirdPartyTrust.
In some organizations, cybersecurity is still approached as a tactical security problem, instead of as a strategic risk problem. Here’s a lesson on consistency from James Bon
We take a look at the different sides of supply chain data breaches and provide 3 practical tips to secure the extended enterprise.
The second most common breach method is through error, so here’s a lesson on humility from an international crime-fighter, James Bond.
The journey towards full maturity will slow down as organizations adapt to the new normal. Here’s how to face the TPRM challenges of 2021.
Learn how Netskope went from a manual, ad-hoc process to a streamlined, consistent workflow to easily share their security posture with their customers.
Even though organizations might have performed third-party risk assessments at the beginning of the year, it’s possible that their business continuity plans didn’t include a response to a pandemic.
Manually managing 150 vendors per year was too time consuming. With ThirdPartyTrust, they managed to reduce the average assessment turnaround from 15 days to 2 days.
COVID19 disrupted supply chains. We take a look from a third-party risk perspective, and provide some tips to boost the supply chain resilience.
There are many ways and frameworks to do TPRM, but organizations usually follow one of the following three: the good, the bad, and the ugly.