Most Recent Assets

digital supply chain
Cybersecurity

Protecting Your Digital Supply Chain - Three Tips

In his 2001 book From Analogue to Digital Supply Chains Tony Hines coined the term “digital supply chain” to explain the electronic distribution o ...

ransomware TPRM
Data & Cybersecurity

Ransomware and TPRM: Steps You Can Take Now

Ransomware attacks are dominating headlines. Solar Winds, JBS, Colonial Pipeline, and Kaseya VSA are household names not because of the products or se ...

kaseya 2
Data & Cybersecurity

Collected Thoughts On The Kaseya VSA Attack

Just before the Fourth of July weekend, Kaseya, an IT solutions developer for managed service providers (MSPs) and enterprise clients, fell prey to a ...

World-Class Educational Materials

Browse articles, studies, papers and more or join our mailing list to have them to sent to your inbox. You can also visit our glossary.

digital supply chain Blog
Cybersecurity

Protecting Your Digital Supply Chain - Three Tips

In his 2001 book From Analogue to Digital Supply Chains Tony Hines coined the term “digital supply chain” to explain the electronic distrib ...

VIEW ALL BLOG
Roadmap IoT studies
Benchmark Study

A New Roadmap for Third Party IoT Risk Management

A New Roadmap for Third Party IoT Risk Management is the Shared Assessments’ fourth annual collaborative study with The Ponemon ...

VIEW ALL STUDIES
Nth Party Governance papers
White Papers

Complex Supply Chains - Gaining Visibility into Nth Party Governance

This briefing paper provides insight into gaining greater supply chain sovereignty by identifying critical dependencies across both inbound and outbou ...

VIEW ALL PAPERS
events

2022 TPRM Toolkit Review and Demo

Our Shared Assessments team and member-driven Tool Development Committees have spent the last year updating and upgrading the SIG, SCA, VRMMM and Priv ...

VIEW ALL EVENTS