Risk Quantification

Risk Quantification: Techniques For The Extended Enterprise

In the current business landscape, organizations rely on numerous third and Nth parties to produce goods and services. The complexity of these outsourcing activities makes it difficult to understand risks across the supply chain. At the same time, new risks are mounting, and the frequency of severe ....

Register to Download
Geopolitical Risk

Guide: Geopolitical Risk - Spotlight on the Russia/Ukraine Conflict

Geopolitical risk stems from war, terrorism, and even ongoing tensions between states that derail normal and peaceful international relations. Geopolitical risk has an adverse impact on the delicate balance of the world’s economy, security, and political relations. What does geopolitical ri ....

Register to Download
taxonomy

A Unified Third Party Continuous Monitoring Cybersecurity Taxonomy

This paper provides a unified continuous monitoring cybersecurity taxonomy. A living document designed to evolve with the cybersecurity landscape, the taxonomy advances communication about evaluating and monitoring the impact of cyber threats. Cybersecurity monitoring solution providers, outsourcers ....

Register to Download
Spring4Shell

Using the SCA in Complement with Other Assessments: Streamlining Due Diligence

This Building Best Practices resource: Examines how to improve due diligence assessment productivity. Identifies a strong strategy that leverages control verification reports. Documents a means of examining existing artifacts to more efficiently scope any remaining due diligence. A p ....

Register to Download
MA

Using TPRM Best Practices to Improve M&A Outcomes

TPRM practices are ideally suited to enhancing M&A outcomes. By applying TPRM best practices, a wider range of risks deeper in the supply chain can be examined than is typically achieved in M&A due diligence. The guide outlines specific best practices to help lower risks; discusses acquirer ....

Register to Download
Next Page »