Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Cybersecurity

Leading Third Party Risk Summit – Celebrating Our 10th Year

Published on May 10, 2017 By | Posted in: Blog, CTPRP Training, Cybersecurity, Event, Guidance, Larry Ponemon, News, Newsletter, Shared Assessments Summit, Third Party Risk Management

. Shared Assessments Program Summit Addresses Digital Transformation As organizations embrace the opportunities afforded by digital technologies, they are facing a business ecosystem that will be forever transformed. The 10th Annual Summit includes pre-Summit workshops and is designed as a comprehensive opportunity for learning, networking and sharing around third party risk. We’ve devoted the week […]

The Shared Assessments Program 2017 Strategic Risk Management Initiative

Published on April 11, 2017 By | Posted in: Best Practices, Board's, Business Resiliency, Certified Third Party Risk Professional (CTPRP) program, Cybersecurity, Education, Framework, Outsourcing, Risk, Risk Management, Security, Third Party Risk, Third Party Risk Management, Vendor Risk Managment

The Shared Assessments Program is the only organization that has uniquely positioned and developed standardized resources for managing the complete third party relationship lifecycle. Such standardization is critical to the advancement of effective, secure third party controls and risk management in an otherwise fractured market. As part of our 2017 initiative, we’re formalizing the Shared […]

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

Published on January 13, 2017 By | Posted in: Advanced Persistent Threats, Cyber Attacks, Cyber Crime, Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. […]

G-7 Financial Sector Fundamental Cybersecurity Guidance

Published on October 14, 2016 By | Posted in: Blog, Cybersecurity, Guidance

This week the U.S. Department of the Treasury and the Board of Governors of the Federal Reserve System announced the publication of the G-7 Fundamental Elements of Cybersecurity for the Financial Sector. The document, released by central bank governors and finance ministers of the G-7 nations, delineates eight fundamental elements around cybersecurity for the financial […]

At the Heart of the Cyber Security Skills Shortage

Published on September 7, 2016 By | Posted in: Blog, Cyber Attacks, Cybersecurity, Hacking

Three recent studies demonstrate that organizational and IT department leadership sit squarely at odds with several important challenges to improving IT-related risk postures: Predictions that organizations do not plan to increase the level on hand security expertise; A well-documented and looming shortage of cybersecurity and IT professionals; and Just 18% of employers reported willingness to […]

The NIST Risk Management Framework: Key Things You Should Consider

Published on February 8, 2016 By | Posted in: Cybersecurity, Framework, National Institute of Standards and Technology (NIST), Risk Management

Are you familiar with the National Institute of Standards and Technology’s “Framework for Improving Critical Infrastructure Cybersecurity”? It’s often referred to as the “NIST risk management framework.” The interesting thing about the NIST framework is that it doesn’t work like other regulations, which ask businesses to fulfill a number of specific requirements for the sake […]

APTs: The Newer, Smarter, and Actually Successful Wile E. Coyote

Published on January 15, 2016 By | Posted in: Advanced Persistent Threats, APT, Cyber Attacks, Cyber Crime, Cyber Risk, Cybersecurity

Remember the old Looney Tunes cartoons where Wile E. Coyote nearly destroys himself in attempt after fruitless attempt to capture the Road Runner? The Road Runner seems to have a sixth sense when a trap is sprung across his path and always escapes unscathed. Well, when it comes to cyber attacks, threat actors are far […]

Experts Predict Security and Privacy Trends for 2016

Published on December 21, 2015 By | Posted in: Cybersecurity, Data, Data Breach, Incident Reponse, Internet of Things (IoT)

Originally posted by ID Experts Blog. Reposted with permission. 2015 was a challenging year for defenders of privacy and security. For the first time, cyber-attacks became the leading cause of data breaches, as indicated by several annual data breach studies, including the Fifth Annual Benchmark Study on Privacy & Security of Healthcare Data. At the […]

Target Reaches Settlement with Banks

Published on December 3, 2015 By | Posted in: Blog, Cybersecurity, Data Breach

Two years after the event the full cost of the Target breach is coming into sharper focus. In addition to a $900 million dollar revenue decline in the 4th quarter of 2013 (versus 2012), the loss of any possible revenue growth in the 2013 holiday season, legal costs, etc., Target will pay MasterCard, Visa, and […]

Building Breach Resistance in Your Business Partners

Published on November 10, 2015 By | Posted in: Blog, Cybersecurity, Data Breach, Shared Assessments, Third Party Risk, Third Party Risk Management

According to the Ponemon Institute’s 2014 Global Report on the Cost of Cybercrime, a quarter of organizations worldwide fail to meet their own security requirements. If your organization is one of that 25 percent, given the surging rate of cybercrime, you are probably hurrying to ramp up privacy and information security programs, staff, and budget. […]

Shared Assessments Licensee Bank of the West
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Logo first data
Shared Assessments Licensee Power Advocate
Shared Assessments Logo Deloitte
Shared Assessments Licensee ControlCase
Shared Assessments Logo pwc
Shared Assessments Logo radian
MetricStream logo
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Logo Ernst & Young
Shared Assessments Logo yodlee
Shared Assessments Licensee Lockpath
Shared Assessments Licensee TD Ameritrade
Shared Assessments Licensee Rsam
Viewpoint Logo
Shared Assessments Logo Iron Mountain
Shared Assessments Licensee Identity Theft 911
Shared Assessments Licensee-Copytalk
Shared Assessments Licensee Protiviti
Shared Assessments Logo usbank
Shared Assessments Logo sei
Shared Assessments Logo dtcc
Shared Assessments Licensee ZS logo
Shared Assessments Licensee ctg
Shared Assessments Logo Deluxe Corp
Shared Assessments Licensee Pivot Point Security
intralinks-logo