In his 2010 dystopian novel Super Sad True Love Story, Gary Shteyngart portrays a near-future in which “credit poles” on city sidewalks continually ping pedestrians with updates of their credit-score. All citizens also wear pendants equipped with by “RateMe Plus”...
Eric Krell
AI Risk: Advanced Technology Adoption Requires Stronger Data Governance
May 2, 2021 | Data & Cybersecurity
The risks and rewards of artificial intelligence (AI) and other advanced technologies were on vivid display in the Wall Street Journal’s April 22 print edition. It’s not too late for third party risk management (TPRM) teams to track down the issue given the growing...
How to Prevent Third Party Risk Management from Running Aground
Apr 2, 2021 | Third Party Risk Management
Before the massive container ship Ever Given was dislodged from the banks of the Suez Canal, the event captured global attention and triggered enlightening refresher courses on supply chain risks, logistics innovations, scenario planning, maritime risks, politics,...
Manage Up to Make Virtual Assessments Succeed
Mar 25, 2021 | Virtual Assessment
In virtual assessments management and in sports, the most important determinants of success tend to reside just outside the boundaries of general awareness. Teams win championships not only because of the players’ talent and experience and the coaching staff’s...
Supply Chain Regulation Upheaval Requires Third Party Risk Management Maturity
Jan 14, 2021 | Business Continuity, Supply Chain, Third Party Risk Management
Keeping pace with supply chain regulation upheaval requires a disciplined approach to managing third party risk. Two years ago, a comprehensive benchmarking survey report on third party risk management (TPRM) practices concluded that “vendor risk management programs...
5 Focal Points for Virtual Assessments
Jan 6, 2021 | Third Party Risk Management, Virtual Assessment
While the use of virtual assessments was rising prior to 2020, that adoption accelerated beyond all expectations last year thanks to the COVID-driven work-from-home (WFM) transformation. This sudden shift caused numerous disruptions, including upending the risk...
The Nitty-Gritty on 5G Privacy
Jun 14, 2020 | Big Data, Data & Cybersecurity, Privacy
5G Privacy begs the question "Would you rather a have crane collapse on you while strolling through a city or have your every move tracked by Big Brother?" That’s the type of painful data-privacy tradeoff individuals and companies could be making once more 5G...
Sign up for our Newsletter
Learn about upcoming events, special offers from our partners and more.
Sub Topics
- Agreed Upon Procedures (AUP)
- Artificial Intelligence
- Assessment Firms
- Banking and Financial Services
- Benchmark Study
- Best Practices
- Best Practices
- Best Practices
- Big Data
- Board of Directors
- Brexit
- Briefing Paper
- Business Continuity
- Business Resiliency
- California Consumer Privacy Act (CCPA)
- Certification
- Certified Third Party Risk Professional (CTPRP)
- Cloud Computing
- Collaborative Onsite Assessment
- Compliance
- Contracts
- Corporate Culture
- Corporate Reporting
- Cyber Crime
- Cyber Insurance
- Cyber Risk
- Cyberattacks
- Cybersecurity
- Cyberwarfare
- Data
- Data & Cybersecurity
- Data Breach
- Data Governance Tools
- Data Privacy Day
- Data Protection
- Dodd-Frank
- Education and Training
- Environmental Social Governance (ESG)
- Event
- FINRA
- Framework
- Fraud
- General Data Protection Regulation (GDPR)
- Global Risk
- Governance
- Guidance
- Hacking
- Health Insurance Portability and Accountability Act (HIPAA)
- Healthcare
- Incident Reponse
- Industry Members
- Industry Verticals
- Information Security
- Internet of Things (IoT)
- Larry Ponemon
- Licensees
- News
- News And Events
- Office of the Comptroller of the Currency (OCC)
- On-site Assessment
- Operational Risk
- Operational Technology (OT)
- Outsourcing
- Pandemic Planning
- Payments
- Payments
- PCI
- PHI
- Ponemon Institute
- Press Release
- Privacy
- Program Tools
- Program Tools
- Public Policy
- Regulations
- Regulatory Compliance
- Regulatory Requirements
- Research And Publications
- Risk
- Risk Assessment
- Risk Compliance
- Risk Management
- Risk Professionals
- Security
- Service Providers
- Shared Assessments
- Shared Assessments Summit
- Standardized Control Assessment (SCA)
- Standardized Information Gathering (SIG)
- Standards
- Supply Chain
- Supply Chain
- Survey
- Third Party Oversight
- Third Party Risk
- Third Party Risk Management
- Tokenization
- Tone at the Top
- Tools & Templates
- Uncategorized
- Vendor Assessment
- Vendor Oversight
- Vendor Risk
- Vendor Risk Management
- Vendor Risk Management Maturity Model (VRMMM)
- Vendor Security
- Virtual Assessment
- Webinar
- White Papers