Authorities on Risk Assurance

The Shared Assessments Blog

Viewing Category: Vendor Security

Third Party IoT Security: Interpreting Survey Results in the Context of a Shifting Security Paradigm

Published on July 17, 2017 By | Posted in: Cyber Attacks, Data Protection, Internet of Things (IoT), News, Third Party Oversight, Third Party Risk, Vendor Risk Managment, Vendor Security, Vendor Threat

Shared Assessment’s just published Ponemon research report The Internet of Things (IoT): A new Era of Third Party Risk provides a great snapshot of current IoT Risk management both within an organization’s four walls and with the third parties that so often support mission critical activities. Many of the report’s findings are troublesome: the lack […]

Press Release: 2016 Shared Assessments-Protiviti Benchmark Study

Published on December 20, 2016 By | Posted in: Benchmark Study, Blog, Press Release, Third Party Risk, Third Party Risk Management, Vendor Risk, Vendor Risk Managment, Vendor Security

MEDIA CONTACT: Marya Roddis, Vice President of Communications O: 505-466-6434 C: 575-235-8228 marya@santa-fe-group.com 2016 Shared Assessments-Protiviti Benchmark Study Demonstrating the Increased Maturity of Third Party Risk Management Programs Santa Fe, NM – December 20, 2016 – The member-driven Shared Assessments Program and Protiviti, Inc., a Shared Assessments member organization, are pleased to announce the release […]

Strengthening Third Party Risk Management with Agnostic Program Tools

Published on December 14, 2016 By | Posted in: Agreed Upon Procedures (AUP), Blog, Newsletter, Press Release, Program Tools, Risk Assessment, Risk Management, Shared Assessments, Standardized Information Gathering (SIG), Third Party Risk, Third Party Risk Management, Tone at the Top, Vendor Risk, Vendor Risk Management Maturity Model (VRMMM), Vendor Risk Managment, Vendor Security

Third party mishaps resulting in breaches and other newsworthy events continue to drive home the need for improved risk management program capabilities in all verticals. From planning for engagement, through due diligence and vendor selection, contract negotiations, ongoing and continuous monitoring and through termination, the Program Tools helps organizations effectively manage the critical components of […]

Updated for 2017: Tools Specifically Designed to Manage Third Party Risk

Published on November 29, 2016 By | Posted in: Agreed Upon Procedures (AUP), News, Press Release, Program Tools, Risk Assessment, Risk Management, Shared Assessments, Standardized Information Gathering (SIG), Third Party Risk, Third Party Risk Management, Vendor Risk, Vendor Risk Management Maturity Model (VRMMM), Vendor Risk Managment, Vendor Security

PRESS RELEASE Contact: Marya Roddis Vice President of Communications marya@santa-fe-group.com  505-466-6434 Updated for 2017: Tools Specifically Designed to Manage Third Party Risk Shared Assessments Program Tools Empower Risk Management Confidence Santa Fe, NM — November 29, 2016 — The Shared Assessments Program, the member-driven trusted source in third party risk assurance, announces the release of […]

Program Tool Updates: Member-Driven Updates Are Creating Sustainable Efficiencies in Risk Management

Published on February 25, 2016 By | Posted in: Agreed Upon Procedures (AUP), Blog, Newsletter, Program Tools, Risk Management, Shared Assessments, Standardized Information Gathering (SIG), Third Party Risk Management, Vendor Risk Management Maturity Model (VRMMM), Vendor Risk Managment, Vendor Security

As the third party risk environment continues to require more from C-level executive and third party risk management professionals, Shared Assessments again takes the lead in providing powerful tools to improve assessment-related economies and scalability for both outsourcers and providers. The January 2016 Shared Assessments Program Tools release provides another level of advance in third […]

EMA and Prevalent Publish Infographic Focused on Vendor Threat Management and Executive Management

Published on October 29, 2015 By | Posted in: Infograph, Vendor Risk, Vendor Risk Managment, Vendor Security, Vendor Threat

This week, Prevalent published an infographic developed by analyst firm EMA focused on vendor threat management. The infographic starts with a simple question ‘Do We Need Vendor Threat Management?’ It highlights a senior executive speaking with a team member asking whether his organization is prepared to take on third-party risk. The team member answers that […]

2nd Annual Vendor Risk Management Benchmark Study Shows Need for Step-Function Improvement

Published on July 21, 2015 By | Posted in: Benchmark Study, Newsletter, Shared Assessments, Third Party Risk Management, Vendor Risk Managment, Vendor Security

Early summer 2015 is proving to be a busy one for those interested in cyber security maturity models, first with the June 30th publication of the FFIEC’s Cyber Security Assessment Tool (which incorporates a cybersecurity maturity model) and now with the release of the second annual Shared Assessments Vendor Risk Management Benchmark Study. Questions about […]

Dear Member of the Board

Published on February 24, 2015 By | Posted in: Board's, Newsletter, Vendor Risk Managment, Vendor Security

Whether you’re a board member of a retailer like Starbucks or sitting on a large financial services board like JPMorgan Chase, I’ll bet you’re pleased at this point that you said no to SONY board membership. Though Enron is now nearly 13 years behind us, you may recall the U.S. Senate subcommittee finding that ultimately […]

Why Handshakes Are Not Enough — Vendor Risk Management is in the Details

Published on February 12, 2015 By | Posted in: Vendor Risk Managment, Vendor Security

The days of doing business with a handshake and a smile are long gone. However, one thing continues to remain constant—how few vendor contracts are updated, even if the scope of service changes. This can be detrimental to an organization, particularly if the vendor is handling sensitive data such as personally identifiable information (PII), protected […]

Insider Threats – A Need to Rethink Enterprise Security?

Published on November 6, 2013 By | Posted in: Cyber Risk, News, Security, Vendor Security

Cybercriminals are targeting privileged network users in ways that are increasingly devastating to security efforts across the financial services industry. These types of insider threats have become more prevalent in the past two years due to the combination of: Increased network activity volumes that makes pinpointing anomalies more difficult: The growing use of cloud computing […]

Shared Assessments Logo Iron Mountain
Shared Assessments Logo sei
Shared Assessments Logo Deluxe Corp
Shared Assessments Licensee Rsam
Shared Assessments Licensee ZS logo
intralinks-logo
Shared Assessments Logo radian
Shared Assessments Logo pwc
Shared Assessments Logo dtcc
Shared Assessments Logo first data
Shared Assessments Licensee Lockpath
MetricStream logo
Shared Assessments Logo Deloitte
Shared Assessments Program licensee Churchill & Harriman logo
Shared Assessments Licensee Power Advocate
Shared Assessments Logo Bank Of New York Mellon
Shared Assessments Licensee Bank of the West
Shared Assessments Licensee Protiviti
Shared Assessments Logo Ernst & Young
Viewpoint Logo
Shared Assessments Licensee Pivot Point Security
Shared Assessments Licensee TD Ameritrade
Shared Assessments Logo usbank
Shared Assessments Licensee ControlCase