Blog

Right Sizing the SIG

Right-Sizing the SIG: A Q&A with Shared Assessments CEO Andrew Moyad

by Eric Krell | May 19, 2022 | Risk Management, Standardized Information Gathering (SIG), Third Party Risk, Third Party Risk Management, Tools & Templates

Shared Assessments CEO Andrew Moyad had a quite a head start getting up to speed after stepping into his current role in February. Moyad’s 25-plus years in risk management and information security includes leadership roles in vendor risk management at Blackstone, one of the world’s top global as ....

risk in the metaverse

Managing Risk In The Metaverse

by Sabine Zimmer | May 18, 2022 | Big Data, Data & Cybersecurity

Madonna entered the metaverse last week when she released her hyped non-fungible token (NFT) art series. Over the weekend, the “Material Girl” acquired an immaterial (but collectible) Bored Ape #4988 with NFTs equal to 180 ether or $564K at time of settlement. Top-notch celebs have been explo ....

Battling Cyber Complacency

Battling Cyber Complacency: You Need More Than An Umbrella In A Hurricane

by Ron Bradley | May 17, 2022 | Data & Cybersecurity

Is cyber complacency the biggest cyberthreat of all? It seems that it is raining cyberattacks as the methods for deploying attacks grow easier and more accessible. Malicious subscription-based services such as ransomware-as-a-service (RaaS) are prevalent. And, a recent launch of malware-as-a-servic ....

Facebook Whistleblower Frances Haugen

Facebook Whistleblower Frances Haugen

by Vivian Nguyen | May 17, 2022 | Data & Cybersecurity

Who is Frances Haugen? Frances Haugen grew up attending the Iowa caucuses with her academic parents giving her a strong sense of pride in democracy and civic responsibility. Haugen holds a degree in Electrical and Computer Engineering from Olin College and an MBA from Harvard. She is a specialis ....

Cash App Breach

Cash App Breach: Why Least Privilege Access Matters

by Kristen Hicks | May 9, 2022 | Data & Cybersecurity

We know hackers are getting more sophisticated. Cyber attacks and data breaches make the news on a regular basis, and the costs involved are staggering. But as organizations work to shield themselves from the growing threat of outside hackers, failing to look for threats from within could be just as ....

Summit 2022 Day 2

2022 Third Party Risk Summit: Day 2 Recap

by Mark Rudio | May 6, 2022 | News And Events, Shared Assessments Summit

Lifetime Achievement Awards Catherine Allen (Founder and Chairperson of Shared Assessments) was honored to present these awards “to two extremely deserving recipients” at the 2022 Third Party Risk Summit. Ms. Allen noted Security Magazine called Dr. Larry Ponemon (Founder, Ponemon Institute) ....

DAY OF Summit Social Posts 1

2022 Third Party Risk Summit: Day 1 Recap

by Mark Rudio | May 4, 2022 | News And Events, Shared Assessments Summit

Catherine A. Allen, Founder, Chairman and former CEO of Shared Assessments, kicked off the 2022 Third Party Risk Summit with a warm welcome while noting “It’s really a strange time. It’s been a strange time ever since Covid started, and since our last in-person conference, which was in 2019. ....

Supply Chains of the Future

Future Supply Chains: More Diversity, Sharper Diligence

by Eric Krell | May 3, 2022 | Business Continuity, Supply Chain

Applying a dose of hindsight to the Conference Board’s C-Suite Outlook 2022 survey report seems to reveal major gaps. Surveying 1,614 C-suite executives (including 917 CEOs globally), the report reflects “C-Suite Outlook,” exploring external stress points faced by business leaders. What is th ....

The Great Resignation Managing Third Party Risk

The Great Resignation: Managing Third Party Risk

by Eric Krell | May 2, 2022 | Data & Cybersecurity

One year ago, a Texas A&M educator predicted a trend that now taxes nearly every third party risk management program, whether they know it or not. “The great resignation is coming,” Texas A&M Associate Professor of Management Anthony Klotz warned Bloomberg BusinessWeek last May. “When there’ ....

quantum ransomware

Quantum Ransomware - Quick Questions

by Mark Rudio | May 2, 2022 | Data & Cybersecurity

Another ransomware attack is garnering a lot of attention. Not because the perpetrators want an astonishing amount of crypto, or because they’re threatening to disrupt commerce across an entire country, but because the threat actors went from infecting the victim’s system to encrypting it in les ....

Next Page »