Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Shared Assessments

Shared Assessments Welcomes New Teammates

Shared Assessments is evolving and growing.  We have welcomed four new additions to our team - of which I am one! Patrick Lang, Vivian Nguyen (me), Lea Brymer, and Cheri Collins are new to the team.   Patrick Lang has joined the staff...

Read More
Best Practices

Theranos Trial: Could TPRM Have Kept Blood Off The Board’s Hands?

Our collective ears at Shared Assessments perk up when “third party” is mentioned as evidence in a court room. A high-profile jury trial is unfolding in San Jose, California, and testimony has pointed to the use of third parties in...

Read More
Cybersecurity, Risk Landscape

Data Retention Policy – How To Catch And Release Data

“In catch and release fishing, anglers immediately release native fish - unharmed - back to the waters from which they are caught,” says the National Parks Service. The Parks Service also recommends that anglers “learn the regulations.” Catch and release...

Read More
Cybersecurity, Risk Landscape

Could Cyberwarfare Make the World Safer?

When you hear the word “cyberwarfare” hope probably isn’t the main emotion you feel. The word is far more likely to inspire feelings of fear—a response that hasn’t been helped by years of sci-fi movies where conflicts between man and...

Read More
Risk Landscape, Supply Chain Risk

The Importance of Supply Chain Risk Management – Marketron Cyberattack

Marketron Broadcasting Solutions, whose products and services support multimedia advertising campaigns across television, radio, and digital media, was struck with a cyberattack over the weekend. Marketron’s website notes that “Marketron is experiencing a cyber event, which is impacting certain business...

Read More
ESG, Risk Landscape

ESG Risk In TPRM – Webinar Summary

As third party risk management programs are being tasked to assist their organizations' ESG (environmental, social, and governance) efforts with their most critical suppliers and vendors, TPRM teams have been left scratching their collective heads and asking “what does this...

Read More
Best Practices, Risk Landscape

Top 5 Emerging Third Party Risk Threats

Last week, Tom Garrubba, VP, Shared Assessments and Alastair Parr, SVP of Global Products & Delivery, Prevalent, presented the Top 5 Emerging Third Party Risk Threats. The pair offered an overview of: Effective remote assessment methodologies Proactive event management Supply...

Read More
Tools and Products

Shared Assessments SIG: 5 Most Asked Questions (and Answers)

“Survey says!” Depending on your age and viewing habits, that phrase likely calls to mind Family Feud hosts Richard Dawson, Louie Anderson or Steve Harvey. The legendary game show pits two families against each other in a trivia contest whose...

Read More
Best Practices, Risk Landscape

Crisis Preparedness Month: 5 Risk Management Areas to Address

On a normal day when life is going well, no one wants to think about disasters. Committing time and budget to crisis preparedness can be a hard sell for businesses facing priorities that feel more immediate. Yet investing in preparation...

Read More
Cybersecurity, Risk Landscape

Cybersecurity Resources: Do Your Part

With less than one month to go until Cybersecurity Awareness Month, the National Cybersecurity Alliance hosted a conversation between Bryan Smith, Section Chief, Cyber Criminal Section, Federal Bureau of Investigation, and Mitchel Chang, SVP of Corporate Social Responsibility and Initiative...

Read More
Tools and Products

Risk Management Toolkit 2022: Coming Soon

September brings fall, Mercury in retrograde (whatever that means!) and the arrival of the 2022 Shared Assessments Third Party Risk Management Toolkit. The 2022 Shared Assessments Third Party Risk Toolkit - the industry standard in risk management - is due...

Read More
Cybersecurity, Risk Landscape

Anatomy of an Attack: T-Mobile Hack Takeaways

As far as digital heists go, last week’s T-Mobile hack was about as complicated as a convenience store smash-and-grab, albeit one that exposed the personal data of 40 million-plus customers. In lieu of any ransom schemes, the stolen records of...

Read More
1 13 14 15 16 17 52