risk management pandemic

Guide: Evolving Work Environments - Impact of Covid-19

In and outside of work, the Covid-19 pandemic was a mandatory exercise in flexibility. What are the workplace shifts we see impacting third-party risk management as we emerge from the pandemic? This guide emphasizes how the pandemic has affected profile and management of third parties by:  ....

Register to Download
Risk Management Landscape

Third-Party Risk Management: Landscape Overview

We surveyed more than 600 third-party risk management (TPRM) executives and practitioners directly involved with their organizations’ approach to vendor risk management. This infographic gives an overview of what we learned about trends, challenges, and priorities in risk management. ....

Register to Download
Guide To Risk Domains 1

Guide: Risk Domains

This guide introduces and defines eighteen of the most critical and current risk domains within four key areas. The guide describes why organizations need to acknowledge each risk domain and offers concrete suggestions of how organizations can account for risks presented by each domain. ....

Register to Download
Risk Quantification

Risk Quantification: Techniques For The Extended Enterprise

In the current business landscape, organizations rely on numerous third and Nth parties to produce goods and services. The complexity of these outsourcing activities makes it difficult to understand risks across the supply chain. At the same time, new risks are mounting, and the frequency of severe ....

Register to Download
Geopolitical Risk

Guide: Geopolitical Risk - Spotlight on the Russia/Ukraine Conflict

Geopolitical risk stems from war, terrorism, and even ongoing tensions between states that derail normal and peaceful international relations. Geopolitical risk has an adverse impact on the delicate balance of the world’s economy, security, and political relations. What does geopolitical ri ....

Register to Download

A Unified Third Party Continuous Monitoring Cybersecurity Taxonomy

This paper provides a unified continuous monitoring cybersecurity taxonomy. A living document designed to evolve with the cybersecurity landscape, the taxonomy advances communication about evaluating and monitoring the impact of cyber threats. Cybersecurity monitoring solution providers, outsourcers ....

Register to Download

Complex Supply Chains - Gaining Visibility into Nth Party Governance

This briefing paper provides insight into gaining greater supply chain sovereignty by identifying critical dependencies across both inbound and outbound supply chains. Adopting this proactive stance provides many opportunities for organizations, including being ready to respond to the regulatory cha ....

Register to Download
CTA scaled

C-Suite Call to Action - Risk Management Through A Different Lens

This paper provides a quick overview and concrete action steps that will help organizations achieve superior outcomes over time. Traditional approaches that rely solely on point-in-time assessments can no longer keep up with rapidly changing or emerging risks. Determine how to make your program work ....

Register to Download
complex chain

Adaptive Risk Management for Complex Supply Chains

This briefing paper provides a foundation for a more robust TPRM style – one that applies complex adaptive systems to the field of risk management to help practitioners understand step-function, cascading improvements in risk management processes they can apply to their own programs. The related ....

Register to Download

Using the SCA in Complement with Other Assessments: Streamlining Due Diligence

This Building Best Practices resource: Examines how to improve due diligence assessment productivity. Identifies a strong strategy that leverages control verification reports. Documents a means of examining existing artifacts to more efficiently scope any remaining due diligence. A p ....

Register to Download
Next Page »