Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cybersecurity

Cybersecurity, Risk Landscape

Voice Privacy: An Emerging Conversation

We tend to think of conversations as ephemeral. If a conversation is sensitive, we stop typing and start talking. Our long history of telecommunication regulations has led us to believe our conversations are safe, protected, regulated. And yet some conversations...

Read More
Cybersecurity, Risk Landscape

The Football Approach to Tackling Data Security Risks

The legendary Green Bay Packers coach Vince Lombardi was famous for his "Gentlemen, this is a football" speech at the beginning of each season. This return to fundamentals served his team well over the years--they won five NFL championships, including...

Read More
Best Practices, Cybersecurity

Press Release: 10 Tips to Address Latest Third Party Security Risks: Payment Systems, Data Breaches, Cybersecurity

PRESS RELEASE Contact: Lisa MacKenzie, MacKenzie Marketing Group, 503-225-0725, lisam@mackenzie-marketing.com or Kelly Stremel, kellys@mackenzie-marketing.com 10 Tips to Address Latest Third Party Security Risks: Payment Systems, Data Breaches, Cybersecurity Experts Discuss an Ever-Changing Threat Landscape; Share Insights on Third Party Oversight...

Read More
Cybersecurity, Risk Landscape

Cybersecurity: The 2015 Buzzword for Banks (and Everybody Else)

Cybersecurity is the hot topic du jour. According to IBM’s 2014 Cyber Security Intelligence Index, there were 1.5 million monitored cyber attacks in the United States, and WIRED.com cites nation-state attacks, extortion, data destruction, and third party breaches among the...

Read More
Cybersecurity, Risk Landscape

Data Breach: Threats, Plan, Response

Recently, I had the opportunity to co-present with John Sileo, from www.sileo.com at the 42nd annual seminar of the RIMS Society Minnesota chapter. John kicked off the event with a keynote titled “Data Spies, Hackers, and Online Attackers” which was...

Read More
Cybersecurity, Risk Landscape

When it Comes to Third Parties, Don’t Forget About Your Non-PII Data

Many moons ago when I was in internal audit a friend of mine who was an application manager within the same company brought me an interesting request; he wanted me to audit his application. I was a bit befuddled, and...

Read More
1 14 15 16 17