Ready or not, IoT third party risk is here. Given the proliferation of connected devices, today’s cyber climate is evolving and organizations have to shift their focus to the security of external parties, now more than ever,” said Charlie Miller, Senior Vice President...
Robin Slade
Fourth Party Risk Management Paper
Jun 3, 2017 | Risk Landscape
Risk from downstream parties is increasing as outsourcing organizations engage more and more third parties who themselves have their own outside provider relationships. The proliferation of fourth party relationships provides the undesired opportunity for the...
Continuous Monitoring of Third Party Vendors: Building Best Practices
Jun 3, 2017 | Best Practices
Moving the Needle on Longitudinal Tracking for More Effective Processes Continuous monitoring, a subset of ongoing monitoring, moves the risk posture of systems to a level that allows tracking over time, often in real-time, to raise awareness of changing...
Building Best Practices in Third Party Risk Management: Involving Procurement Paper
May 3, 2017 | Best Practices
Establishing a strong standard for risk management means including all stakeholders before a third party is brought on board. The paper focuses on ways to effectively integrate Procurement into the third party oversight function.
Financial Services Industry Call to Action
Apr 3, 2017 | Risk Landscape
The increased connectivity and complexity of critical infrastructure systems both nationally and globally puts economic and public security squarely at the forefront of risk management in every sector and industry vertical. A proactive stance is clearly required to...