Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Security

Tips, Tools and Recommendations for Improving Healthcare Security

Published on June 7, 2017 By | Posted in: Healthcare, News, Security, Shared Assessments Summit

In this series, Shared Assessments Advisory Board Committee member Ken Peterson talks about managing cyber risk in the Healthcare space. We look forward to hearing more on this topic from Ken and the NH-ISAC at the 10th Annual Shared Assessments Summit. Q&A Series – Part 2 For the healthcare industry, let’s talk about third party […]

The Evolving Threat Landscape and New Challenges for Healthcare Security

Published on June 1, 2017 By | Posted in: Healthcare, Security

In this series, Shared Assessments Advisory Board Committee member Ken Peterson talks about managing cyber risk in the Healthcare space. We look forward to hearing more on this topic from Ken and the NH-ISAC at the 10th Annual Shared Assessments Summit. Q&A Series – Part 1 As a seasoned veteran in risk management and threat […]

The Shared Assessments Program 2017 Strategic Risk Management Initiative

Published on April 11, 2017 By | Posted in: Best Practices, Board's, Business Resiliency, Certified Third Party Risk Professional (CTPRP) program, Cybersecurity, Education, Framework, Outsourcing, Risk, Risk Management, Security, Third Party Risk, Third Party Risk Management, Vendor Risk Managment

The Shared Assessments Program is the only organization that has uniquely positioned and developed standardized resources for managing the complete third party relationship lifecycle. Such standardization is critical to the advancement of effective, secure third party controls and risk management in an otherwise fractured market. As part of our 2017 initiative, we’re formalizing the Shared […]

Setting Expectations for Your Third Parties

Published on March 14, 2017 By | Posted in: Best Practices, Business Resiliency, Education, Newsletter, Outsourcing, Risk, Risk Management, Security, Third Party Risk, Third Party Risk Management, Vendor Risk Managment

Risk Rating During On-Boarding Including third party risk rating as a strategic part of a robust risk management program provides the opportunity for early identification of the wide range of issues that ripple through both regulated and unregulated industries wherever outsourcing is present. Scoring third parties consistently was ranked as the most challenging issue in […]

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

Published on January 13, 2017 By | Posted in: Advanced Persistent Threats, Cyber Attacks, Cyber Crime, Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence Services (RIS) to compromise and exploit networks and endpoints associated with the U.S. […]

Halloween Happenings – What’s Scaring Your Risk, Privacy & Security Professionals?

Published on October 31, 2016 By | Posted in: Fraud, Privacy, Risk, Security

Hacking and data breaches have continued to dominate media headlines, putting a stronger emphasis on Cyber Security. However, there are other emerging terms that are creating goosebumps, scary dreams, and keeping compliance professional up at night. This past week, over 400 attendees at the 14th annual Executive Women’s Forum, conference with a theme focused on […]

Privacy. Security. Risk. 2015: En Garde! The Duels to Protect Customer Information

Published on November 4, 2015 By | Posted in: Blog, Privacy, Risk, Risk Management, Security

By Brad Reimer, Deluxe Corporation Reposted with permission. Originally posted on Deluxe Blog I recently attended the 2015 Privacy. Security. Risk. (P.S.R.) conference presented by the International Association of Privacy Professionals (IAPP) and the Cloud Security Alliance (CSA). The keynote speakers offered good reminders about the ongoing duel that privacy and security professionals face in […]

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Published on October 21, 2015 By | Posted in: Blog, Cybersecurity, Data, Data, Huffington Post, Secret Service

Of all the scandals that have struck the U.S. Secret Service over the past few years, I can’t think of any more damaging than the current controversy involving Congressman Jason Chaffetz (R-Utah), House Oversight and Government Reform Committee Chairman. While it’s probably safe to assume the U.S. Secret Service (like most government agencies) has established […]

Making the Case for a Security Committee of the Board

Published on August 3, 2015 By | Posted in: Board's, Cybersecurity, Security

The daily announcements of cybersecurity breaches, increasing concern about terrorism on critical infrastructures, the rising reputational risks that social media brings, the rapidly changing technology marketplace, and the complexity of managing increasing risks all put pressure on boards to stay up to speed and to be proactive rather than reactive. Traditionally, oversight of operational and […]

Cyber Insecurity In Our New World of IoT

Published on July 13, 2015 By | Posted in: Big Data, Cyber Risk, Data, Internet of Things (IoT), Privacy, Security

I recently attended the Executive Women’s Forum Summit, in New York City, on Unintended Consequences: Internet of Things (IoT) and Big Data which enabled a strategic dialog for information security, risk and privacy professionals navigating today’s changing digital landscape. In this two part blog series, I’d like to start a discussion on how both Big […]

Shared Assessments Licensee Lockpath
Shared Assessments Logo Deluxe Corp
Shared Assessments Logo Deloitte
MetricStream logo
Shared Assessments Logo dtcc
Shared Assessments Licensee Protiviti
Shared Assessments Licensee TD Ameritrade
Shared Assessments Logo usbank
Shared Assessments Logo sei
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Logo radian
intralinks-logo
Shared Assessments Licensee ControlCase
Shared Assessments Logo first data
Shared Assessments Logo pwc
Viewpoint Logo
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Licensee Bank of the West
Shared Assessments Licensee Power Advocate
Shared Assessments Licensee Pivot Point Security
Shared Assessments Licensee ZS logo
Shared Assessments Logo Ernst & Young
Shared Assessments Logo Iron Mountain
Shared Assessments Licensee Rsam