Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Shared Assessments

Pivot Point Security Joins Shared Assessments Program

Pivot Point Security, a leading Information Security Assurance firm, announces that it has recently joined The Santa Fe Group's Shared Assessments Program as an assessment firm member.

Read More
Best Practices

Mobile Devices: What To Do If Your Vendors Implement BYOD

Driven by employee demand and the perception of better efficiency, the use of mobile devices in the workplace continues to grow. So, not only must today’s IT security managers determine how to manage these devices in their own environment, they...

Read More
Best Practices, Risk Landscape

“Right-Sizing” Your Vendor Risk Management Program

Balancing the weights of risk, compliance and governance in today’s regulatory landscape. By Linnea Solem, Deluxe

Read More
Tools and Products

New Shared Assessments Tools Offer New Section for Assessing Mobile Device Risk, Evaluating the Maturity of Your Vendor Risk Management Program

The Shared Assessments Program released to the public the new Standard Information Gathering (“SIG”) questionnaire, Agreed Upon Procedures (“AUP”) and Vendor Risk Management Maturity Model (“VRMMM”) for 2013. The Tools will be available beginning Tuesday, February 19th. Read Press Release...

Read More
Framework, Industry Guidance, and Regulations, Tools and Products

Shared Assessments Questionnaire Now Incorporated Into UCF Regulatory Mapping

The Shared Assessments Program announced that one of its primary risk assessment Tools, the Standard Information Gathering (“SIG”) questionnaire, is now included as one of the authorities mapped by Network Frontiers’ Unified Compliance Framework (UCF), as part of their 3rd...

Read More
Cybersecurity, Risk Landscape

The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security

PHI data breaches are growing in frequency and in magnitude. Protecting valuable health data is an important business decision for all health care organizations. Authored by more than 100 health care industry leaders, this free report includes PHIve—a 5-step method...

Read More
Shared Assessments

ANSI and Shared Assessments Launch Initiative to Examine Financial Impact and Harm of Breached Patient Information

Healthcare organizations are struggling with two key concerns today: how to protect patient information and how to better understand the financial harm caused when protected health information (PHI) is lost or stolen. Download the PDF

Read More
Shared Assessments

Shared Assessments Summit to Feature Cloud Computing, Social Responsibility and the Future of Outsourcing

Download the PDF

Read More
Tools and Products

New Leaner Shared Assessments Questionnaire Offers Risk Scoring

Download the PDF

Read More
Best Practices

Shared Assessments Publishes Enterprise Cloud Computing Guide

Download the PDF

Read More
Shared Assessments

Shared Assessments Summit Explores Cloud Computing, Insider Fraud, Data Breaches

Download the PDF

Read More
Tools and Products

New Shared Assessments Program Tools Help Outsourcers Check Reliability of Cloud, SaaS Providers

Download the PDF

Read More
1 50 51 52 53