Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Shared Assessments

Shared Assessments

Annie Searle Reports on the 2013 DHS Conference

The Department of Homeland Security (DHS) presented its 3rd Annual “Building Resilience through Public-Private Partnerships”,conference on July 30-31, in Washington D.C.  Third party risk issues were discussed in depth around three themes:  emergency management/preparedness, campus resilience, and cybersecurity. Welcoming remarks...

Read More
Shared Assessments

Shared Assessments member Prevalent Networks, announced the release of the Prevalent Vendor Risk Manager (PVRM)

Shared Assessments member Prevalent Networks, announced the release of their flagship solution, Prevalent Vendor Risk Manager (PVRM), which leverages Shared Assessment content for controls-based assessment, schedule regular vendor risk evaluations, and obtain risk scoring per vendor against a set standard....

Read More
Framework, Industry Guidance, and Regulations, Shared Assessments

Pivot Point Security, discusses Shared Assessments on their Information Security Blog

Shared Assessments member, Pivot Point Security, recently discussed Shared Assessments on their Information Security blog. The blog discusses the benefits of Pivot Point Security's involvement as a participating member and the various aspects of our Program.

Read More
Shared Assessments

Pivot Point Security Joins Shared Assessments Program

Pivot Point Security, a leading Information Security Assurance firm, announces that it has recently joined The Santa Fe Group's Shared Assessments Program as an assessment firm member.

Read More
Shared Assessments

ANSI and Shared Assessments Launch Initiative to Examine Financial Impact and Harm of Breached Patient Information

Healthcare organizations are struggling with two key concerns today: how to protect patient information and how to better understand the financial harm caused when protected health information (PHI) is lost or stolen. Download the PDF

Read More
Shared Assessments

Shared Assessments Summit to Feature Cloud Computing, Social Responsibility and the Future of Outsourcing

Download the PDF

Read More
1 7 8 9 10