Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Best Practices

Best Practices

Third Party Onsite Assessment Best Practices: Practitioner Guide

Shared Assessments is providing this updated onsite assessment guide in response to the call from CISOs and other practitioners to remedy the lack of standardization across assessments within sectors, as well as cross-industry (RSAC-ESAF, 2023; Shared Assessments, 2023). Assessors and...

Read More
Best Practices

Framework for Managing Third Party Reputation Risk: Identifying, Assessing, Reporting, Mitigating, and Monitoring

An organization that actively builds and maintains a positive reputation gains a competitive advantage and improves its credibility if an event occurs that impacts that reputation. This paper lays the groundwork and helps stimulate thought around managing reputation risk, providing...

Read More
Best Practices

Third Party Focused Ransomware Strategy: An Enterprise-Wide Collaborative Strategy Guide for TPRM Professionals

While excellent ransomware guides and tools exist from various sources, our new guide (Third Party Focused Ransomware Strategy: An Enterprise-Wide Collaborative Strategy Guide for TPRM Professionals) and the related resources referenced throughout provide a Third Party Risk Management focused approach. The...

Read More
Best Practices

Online Safety For Children

Technology is all around us. Smartphones, smart watches, cars, computers, refrigerators, and cameras have become an enormous part of our everyday lives. These introductions have challenged us to constantly adapt. We are living in (and raising families in) an evolving...

Read More
Best Practices

FIM (File Integrity Monitoring): Protecting Customer’s Credit Card Data

There’s FOMO (Fear of Missing Out) and then there’s FIM (File Integrity Monitoring). You do not want to miss out on understanding what FIM is all about and why the FBI (Federal Bureau Of Investigation) is concerned. The FBI Cyberdivision...

Read More
Best Practices

Third Party Business Continuity and Disaster Recovery Programs

From natural disasters to software failures and cyberattacks, disasters bring considerable risk to businesses. While there is no way to prevent an unforeseen event, you can minimize the ensuing risks by working closely with third parties – those who provide...

Read More
1 2 3 24