Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence S ....

blog 07

Shared Assessments Updated 2017 Program Tools

November 1, 2016 | Program Tools, Shared Assessments, Third Party Risk, Third Party Risk Management, Tools & Templates, Vendor Risk, Vendor Risk Management

Tools That Empower Vendor Management ConfidenceShared Assessments responds directly to the dynamic landscape of third party risk management with the annual update of its Program Tools. The Tools serve organizations, regardless of size and industry, helping them navigate the constantly evolving lands ....

Press Release: Many Companies’ Vendor Risk Management Programs Still Need Improvement, According to New Study from Protiviti and Shared Assessments

July 8, 2015 | News, Press Release, Program Tools, Program Tools, Shared Assessments, Third Party Risk, Third Party Risk Management, Vendor Risk Management

Editor Contacts: For Protiviti: Kathy Keller (650) 234-6252 kathy.keller@protiviti.com For Shared Assessments Program: Sarah Perry, The Santa Fe Group, 602-441-1769, sarah@santa-fe-group.com or Lisa MacKenzie, MacKenzie Marketing Group (503) 705-3508, lisam@mackenzie-marketing.com or Kelly Strem ....

Using Peer Collaboration to Manage Supply Chain Risk

May 29, 2015 | Collaborative Onsite Assessment, Program Tools, Risk, Risk Management, Supply Chain, Third Party Risk Management, Tools & Templates

Today’s companies are outsourcing more critical functions as part of their business operations in today’s complex environment. Every member of the supply chain must be evaluated to ensure they are properly protecting systems and data. With hackers specifically targeting third parties as a way to ....

In 2015, Don’t Just Make New Year Resolutions Regarding Third Party Risk, Keep Them!

January 29, 2015 | Certified Third Party Risk Professional (CTPRP), Program Tools, Third Party Risk Management

Start 2015 on the right foot including your third party risk management program. Here are some suggested “New Year’s Resolutions” to incorporate into your strategic and tactical plans for the coming year: Resolution #1: I will incorporate the new SIG 2015 into my third party program. The new ....

Updated Shared Assessments Program Tools Are Powerful Weapons Against Third-Party Risk in 2015

January 22, 2015 | Program Tools, Third Party Risk Management

The industry is in a state of high alert concerning third party risk in 2015. In fact, Booz Allen Hamilton moved third party risk to the top of the list of cyber security trends for financial services to “guard against” this coming year. WIRED.com also cited third party breaches as one of the si ....

Next Page »