Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Tools and Products

Tools and Products

Combat Insider Threats: CISA’s Risk Mitigation Self-Assessment Tool

The Cybersecurity & Infrastructure Security Agency (CISA) has published a new tool called the Insider Risk Mitigation Self-Assessment Tool (IRMPE), which helps support the public and private sector organizations understand vulnerabilities in regards to insider threats.   What is an Insider? CISA defines an insider as being "any...

Read More
Tools and Products

2022 Third Party Risk Management Toolkit

Standardized Excellence To Meet Today’s Risk Environment Shared Assessments has released the 2022 Third Party Risk Management Toolkit. The tools included in this update are: Vendor Risk Management Maturity Model (VRMMM): Self-assessment of TPRM Programs Standardized Information Gathering Questionnaire (SIG): Efficient...

Read More
Tools and Products

Shared Assessments SIG: 5 Most Asked Questions (and Answers)

“Survey says!” Depending on your age and viewing habits, that phrase likely calls to mind Family Feud hosts Richard Dawson, Louie Anderson or Steve Harvey. The legendary game show pits two families against each other in a trivia contest whose...

Read More
Tools and Products

Risk Management Toolkit 2022: Coming Soon

September brings fall, Mercury in retrograde (whatever that means!) and the arrival of the 2022 Shared Assessments Third Party Risk Management Toolkit. The 2022 Shared Assessments Third Party Risk Toolkit - the industry standard in risk management - is due...

Read More
Tools and Products

Using the SCA in Complement with Other Assessments: Streamlining Due Diligence

This Building Best Practices resource: Examines how to improve due diligence assessment productivity. Identifies a strong strategy that leverages control verification reports. Documents a means of examining existing artifacts to more efficiently scope any remaining due diligence. A practitioner tool...

Read More
Tools and Products

Pre-Summit Workshops – Simply SIG and Point-By-Point Privacy

Day 2, Pre-Summit. From early morning until noon, SIG Toolkit Training – Covering all the Basics workshop was alive with metaphors (and a few practical jokes). Workshop leaders Christopher Campbell (Manager, Sales, Shared Assessments) and Tom Garrubba (Vice President, Shared...

Read More
1 2 3 4 5 6 7