Blog

supplychain

Supply Chain Concentration and Resilience Risk

by Charlie Miller | August 25, 2020 | Business Continuity, Business Resiliency, Incident Reponse, Pandemic Planning, Supply Chain

How do we actually address Supply Chain Concentration and Resilience Risk? Disaster has a way of bringing 'supply chain’ into the common lexicon. In the aftermath of the 2011 Tohoku earthquake, major companies including Apple and Toyota experienced shortages of components manufactured in Japan.   ....

angela 1

Risk Management Jobs - Back To School for PhD in Cybersecurity

by Sabine Zimmer | August 17, 2020 | Data & Cybersecurity, Risk Professionals

We can tell you a lot more about going back to school for your PhD in Cybersecurity than we can about what back-to-school will look like for our own children this year. Let's explore risk management jobs from the cybersecurity perspective. Higher education institutions around the world now offer cy ....

Ten Tips for Virtual Risk Assessments using Shared Assessments' TPRM Toolkit

by Brad Keller | August 7, 2020 | Third Party Risk Management, Virtual Assessment

This blogpost offer ten tips in checklist format for Virtual Risk Assessments.The Covid-19 Pandemic quickly shifted our world to a virtual perspective. Remote workers, remote vendors, remote classes and even remote family get togethers. These changes are not seen as a temporary shift; global compani ....

data privacy

TPRM Implications Privacy Shield Changes

by Linnea Solem | August 5, 2020 | Data & Cybersecurity, Data Protection, General Data Protection Regulation (GDPR), Public Policy

This post reviews TPRM implications of Privacy Shield changes. Privacy, Surveillance, and Data Transfers to the United States are hitting the headlines in privacy and security circles. The C-Suite may be hearing about “Schrems II” and wonder what the hoopla is all about. Let's start at the be ....

IoT

IoT Risk Due Diligence Questions

by Charlie Miller | July 27, 2020 | Data & Cybersecurity, Internet of Things (IoT)

We’ve been fielding many IoT (Internet of Things) questions this summer. Organizations who already use the SIG tool in their TPRM programs and organizations evaluating the SIG tool have asked us about the proper lines of inquiry around IoT. What questions do we need to be asking ourselves and ou ....

Fiduciary Duty Of Boards: When Bad Things Happen To Good Public Accounting Firms

by Bob Jones | July 7, 2020 | Banking and Financial Services, Corporate Culture, Fraud

Recent events point to the need to reexamine the Fiduciary Duty of Boards. Wirecard AG, headquartered in Munich, Germany, is a large, international payments processing fintech company.  On June 19th, the Wall Street Journal reported that funds totaling approximately $2.1 Billion appeared to be m ....

ERM Managing Risks in New Technologies

by Sabine Zimmer | June 30, 2020 | Data & Cybersecurity, Risk Management

Shared Assessments new “Role of Enterprise Risk Management (ERM) in Managing Risks Related to New Technologies” briefing paper examines an under-investigated issue: the fact that most ERM programs have not focused on developing a systemic approach to understanding the risks associated with emerg ....

Financial Crime Risks: What A Vendor Manager Must Know About Sanctions and Money Laundering

by Charlie Miller | June 24, 2020 | Banking and Financial Services

Shared Assessments’ Continuous Monitoring Working Group recently convened to examine the financial crime risks that a vendor manager must understand. Ken Wolckenhauer, head of vendor due diligence and review for the New York branch of Finland-based Nordea Bank, led the discussion around this serio ....

Third Party 5G Risks & The Power of ‘And’

by Charlie Miller | June 14, 2020 | Cyber Risk, Cybersecurity, Data, Data & Cybersecurity

Sharp leaders deploy it, improv performers embrace it and fifth generation (5G) wireless technology depends on it. I’m referring to the power of “and.”   Skim through any thought leadership concerning 5G’s massive potential to generate new business models and related benefits -- remot ....

The Nitty-Gritty on 5G Privacy

by Eric Krell | June 14, 2020 | Big Data, Data & Cybersecurity, Privacy

5G Privacy begs the question "Would you rather a have crane collapse on you while strolling through a city or have your every move tracked by Big Brother?"   That’s the type of painful data-privacy tradeoff individuals and companies could be making once more 5G networks are up and running - ....

« Previous PageNext Page »