Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!
Pivot Point Security, a leading Information Security Assurance firm, announces that it has recently joined The Santa Fe Group's Shared Assessments Program as an assessment firm member.
Driven by employee demand and the perception of better efficiency, the use of mobile devices in the workplace continues to grow. So, not only must today’s IT security managers determine how to manage these devices in their own environment, they...
The Shared Assessments Program released to the public the new Standard Information Gathering (“SIG”) questionnaire, Agreed Upon Procedures (“AUP”) and Vendor Risk Management Maturity Model (“VRMMM”) for 2013. The Tools will be available beginning Tuesday, February 19th. Read Press Release...
The Shared Assessments Program announced that one of its primary risk assessment Tools, the Standard Information Gathering (“SIG”) questionnaire, is now included as one of the authorities mapped by Network Frontiers’ Unified Compliance Framework (UCF), as part of their 3rd...
PHI data breaches are growing in frequency and in magnitude. Protecting valuable health data is an important business decision for all health care organizations. Authored by more than 100 health care industry leaders, this free report includes PHIve—a 5-step method...
Healthcare organizations are struggling with two key concerns today: how to protect patient information and how to better understand the financial harm caused when protected health information (PHI) is lost or stolen. Download the PDF