Archives: Papers

Framework for Managing Third Party Reputation Risk

Framework for Managing Third Party Reputation Risk: Identifying, Assessing, Reporting, Mitigating, and Monitoring

Reputation is the currency by which organizations work and survive. Organizations that build and maintain positive reputations gain competitive advantage and credibility. Our newest briefing paper offers practical guidance for managing reputation risk by providing a TRPM Reputation Risk Framework wh ....

Register to Download
Contracts

Partnering With Procurement - Part 2: Supplier/Vendor Contracts

This series affirms the value of having Third-Party Risk Management (TPRM) and Procurement/Sourcing actively engaged as partners in vendor management. Part 2: Supplier/Vendor Contracts describes contracts as being fundamental in identifying, selecting, mitigating, and minimizing exposures and risks ....

Register to Download
Lifecycle

Partnering With Procurement - Part 1: Supplier/Vendor Lifecycle

This series affirms the value of having Third-Party Risk Management (TPRM) and Procurement/Sourcing actively engaged as partners in vendor management. Part 1: Supplier/Vendor Lifecycle explores the benefits of business units sharing responsibility for vetting, onboarding, monitoring, renewing, and t ....

Register to Download
Floating Documents (1)

Iron Mountain Achieves Peak SIG Adoption

Iron Mountain is a recognized leader for storage and information management services around the world. This paper describes Iron Mountain's journey to achieving peak Standardized Information Gathering (SIG) Questionnaire adoption. While utilizing the SIG, Iron Mountain experienced significant reduct ....

Register to Download
TPRM Ransomware

Third Party Focused Ransomware Strategy: An Enterprise-Wide Collaborative Strategy Guide for TPRM Professionals

This paper provides process and program guidance on meaningful, incremental improvements for organizations of all sizes, whether operating locally or globally. The content is designed for both beginning and seasoned security and TPRM practitioners, with an introduction to help inform C-Suite and Boa ....

Register to Download
« Previous PageNext Page ยป