Authorities on Risk Assurance

The Shared Assessments Blog

How Do I Get My Program Up and Running? Follow This Order of Implementation Formula

Published on April 8, 2015 By | Posted in: Third Party Risk, Third Party Risk Management

So, you just walked out of a meeting with the C-suite and you’ve been tasked to implement a new program across the organization. You get back into your office and reality sets in as you mumble to yourself, “How do I start this?” I have been getting this question for years from professionals tasked to […]

Social Media Should Require a Compliance Warning

Published on April 2, 2015 By | Posted in: Compliance, Privacy, Risk Management, Third Party Risk

The usage of social media has shifted with customer adoption. The growth of applications and consumers joining the social media bandwagon has influenced how consumers leverage technology; interact with friends, family and coworkers, and purchase with brands they trust. Pew Research Center estimated in 2014 that 73 percent of Americans over age 18 use social […]

Voice Privacy: An Emerging Conversation

Published on March 17, 2015 By | Posted in: Newsletter, Privacy, Voice

We tend to think of conversations as ephemeral. If a conversation is sensitive, we stop typing and start talking. Our long history of telecommunication regulations has led us to believe our conversations are safe, protected, regulated. And yet some conversations that feel ephemeral aren’t. With the advent of smart phones, we have stopped simply talking […]

The Football Approach to Tackling Data Security Risks

Published on March 12, 2015 By | Posted in: Cybersecurity, Data, Privacy, Security

The legendary Green Bay Packers coach Vince Lombardi was famous for his “Gentlemen, this is a football” speech at the beginning of each season. This return to fundamentals served his team well over the years–they won five NFL championships, including two Super Bowls. Businesses need the same back-to-basics approach when managing security risks to their […]

Press Release: 10 Tips to Address Latest Third Party Security Risks: Payment Systems, Data Breaches, Cybersecurity

Published on March 5, 2015 By | Posted in: Cybersecurity, News, Payments, Press Release, Security, Third Party Risk Management

PRESS RELEASE Contact: Lisa MacKenzie, MacKenzie Marketing Group, 503-225-0725, lisam@mackenzie-marketing.com or Kelly Stremel, kellys@mackenzie-marketing.com 10 Tips to Address Latest Third Party Security Risks: Payment Systems, Data Breaches, Cybersecurity Experts Discuss an Ever-Changing Threat Landscape; Share Insights on Third Party Oversight and How to Manage an Effective Vendor Risk Management Program Santa Fe, N.M. — March […]

Staying Strategic with Third Party Risk

Published on March 2, 2015 By | Posted in: Third Party Risk, Third Party Risk Management

Banks have an opportunity to not only specify and assess controls, but also inspire a strategic and robust approach to risk management. Over the past year, the OCC, the FRB, and the FDIC have all released updated guidance on managing third party risk. One focus of this guidance is the identification of “critical” vendors and […]

Dear Member of the Board

Published on February 24, 2015 By | Posted in: Board's, Newsletter, Vendor Risk Managment, Vendor Security

Whether you’re a board member of a retailer like Starbucks or sitting on a large financial services board like JPMorgan Chase, I’ll bet you’re pleased at this point that you said no to SONY board membership. Though Enron is now nearly 13 years behind us, you may recall the U.S. Senate subcommittee finding that ultimately […]

Rightsizing Tiered Approaches for Risk & Compliance

Published on February 20, 2015 By | Posted in: Compliance, Risk

Last week was an active week of discussion on issues facing financial services companies. I presented at the 40th annual Roundtable for ISACA’s MN Chapter on The Next Generation of Third-Party Risk Management and attended Deluxe Exchange 2015, where an engaging keynote speech by Sheila Bair, former chair of the FDIC highlighted critical issues facing […]

Cybersecurity: The 2015 Buzzword for Banks (and Everybody Else)

Published on February 17, 2015 By | Posted in: Cybersecurity

Cybersecurity is the hot topic du jour. According to IBM’s 2014 Cyber Security Intelligence Index, there were 1.5 million monitored cyber attacks in the United States, and WIRED.com cites nation-state attacks, extortion, data destruction, and third party breaches among the biggest security threats for 2015. Regulators are taking notice, with recommendations and guidelines to help […]

Why Handshakes Are Not Enough — Vendor Risk Management is in the Details

Published on February 12, 2015 By | Posted in: Vendor Risk Managment, Vendor Security

The days of doing business with a handshake and a smile are long gone. However, one thing continues to remain constant—how few vendor contracts are updated, even if the scope of service changes. This can be detrimental to an organization, particularly if the vendor is handling sensitive data such as personally identifiable information (PII), protected […]

Shared Assessments Logo yodlee
Shared Assessments Licensee Bank of the West
Shared Assessments Licensee LTD Financial Services
Shared Assessments Logo Deluxe Corp
Shared Assessments Licensee ControlCase
Shared Assessments Licensee Lockpath
Agio Logo
Shared Assessments Licensee White Hat
PCV-logo-web
Online Business Systems logo
ProcessUnitybanner
Shared Assessments Program licensee Nice logo
evault-logo-web-2
GT_logo_165x100x72_web
Shared Assessments Logo zywave
Shared Assessments Logo pwc
Shared Assessments Logo Bank Of New York Mellon
165x100x72-web
Shared Assessments Logo radian
trusted integration logo
advance-america-logo-web-2
Shared Assessments Logo jpmorgan
Shared Assessments Logo Lerner Sampson & Rothfuss
Shared Assessments Licensee Protiviti
Shared Assessments Licensee Pro Teck
Shared Assessments Program licensee Enode logo
Shared Assessments Logo first data
prevalent-logo-web-2
Viewpoint Logo
Shared Assessments Licensee Power Advocate
kpmg-logo-web-2
Shared Assessments Logo Ernst & Young
continuity-logic-logo-web-2
Genpact-logo-web
booz-allen-logo-web
CRIF Logo
Shared Assessments Logo Deloitte
Shared Assessments Licensee Telerex
Shared Assessments Program licensee Churchill & Harriman logo
sti-logo-web
Shared Assessments Licensee Caanes
Shared Assessments Logo dtcc
Shared Assessments Licensee ZS logo
MetricStream logo
Shared Assessments Logo tsys
intralinks-logo
Shared Assessments Licensee-Copytalk
Shared Assessments Licensee ctg
fis-logo-web
Shared Assessments Licensee TD Ameritrade
Shared Assessments Logo sei
Shared Assessments Logo Iron Mountain
SecureState165x100x72-web
el paso electric logo
ez-shield-logo-web-2
BWSecurityScorecard165x100x72-web
Shared Assessments Licensee redtail
Shared Assessments Licensee Pivot Point Security
Ellie Mae Logo
Shared Assessments Licensee BSI
Shared Assessments Licensee RSA
waynecounty_logo_165x100x72_web
Shared Assessments Licensee Rsam
veracode-logo-web
Early Warning Logo
Shared Assessments Licensee Identity Theft 911
Shared Assessments Licensee-Brainshark
brinqa-logo-web
Shared Assessments Licensee BWise
Aujas Information Risk Services Logo
dealogic-20logo-high-20res_165x100x72_web
Shared Assessments Logo usbank
NationalStudentClearinghouse