Papers

TPRM Overview

Third Party Risk Management: Landscape Overview

Third Party Risk Management: Landscape Overview We surveyed more than 600 third-party risk management (TPRM) executives and practitioners directly involved with their organizations’ approach to vendor risk management. This infographic gives an overview of what we learned about trends, challenge ....

Register to Download
Risk Management Landscape

Third-Party Risk Management: Landscape Overview

We surveyed more than 600 third-party risk management (TPRM) executives and practitioners directly involved with their organizations’ approach to vendor risk management. This infographic gives an overview of what we learned about trends, challenges, and priorities in risk management. ....

Register to Download
Infosheet

Spring4Shell Vulnerability: Securing Your Software Supply Chain

Securing Your Software Supply Chain Shared Assessments recommends a specific due diligence process for understanding third-party patch management capabilities using our industry-leading Standardized Information Gathering (SIG) Vendor Risk Questionnaire. In the case of #Spring4Shell (or alter ....

Register to Download
Geopolitical Risk

Guide: Geopolitical Risk - Spotlight on the Russia/Ukraine Conflict

Geopolitical risk stems from war, terrorism, and even ongoing tensions between states that derail normal and peaceful international relations. Geopolitical risk has an adverse impact on the delicate balance of the world’s economy, security, and political relations. What does geopolitical ri ....

Register to Download
Guide Risk Domains

Guide To Risk Domains For Vendor Risk Management

Guide To Risk Domains This guide introduces and defines nineteen of the most critical and current risk domains within four key areas. The guide describes why organizations need to acknowledge each risk domain and offers concrete suggestions of how organizations can account for risks presented by ea ....

Register to Download
taxonomy

A Unified Third Party Continuous Monitoring Cybersecurity Taxonomy

This paper provides a unified continuous monitoring cybersecurity taxonomy. A living document designed to evolve with the cybersecurity landscape, the taxonomy advances communication about evaluating and monitoring the impact of cyber threats. Cybersecurity monitoring solution providers, outsourcers ....

Register to Download
SIG privacy

Privacy Resources For Vendor Risk Management

Data Privacy Scoping Template Given the pace and complexity of data protection regulations, Shared Assessments provides a free, scoped Privacy Standardized Information Gathering (SIG) Questionnaire mapped to privacy frameworks. This template helps organizations complete third party data privacy r ....

Register to Download
log4j laptop 1

Log4j Vulnerability Resources For Vendor Risk Management

Scoping Template Shared Assessments has released a free Standardized Assessment Tool for the Log4j risk. With this scoping template, you will be able to conduct your own vulnerability assessment and share the form with your vendors for a holistic view of Log4j risk across your supply chain. Registe ....

Register to Download

Complex Supply Chains - Gaining Visibility into Nth Party Governance

This briefing paper provides insight into gaining greater supply chain sovereignty by identifying critical dependencies across both inbound and outbound supply chains. Adopting this proactive stance provides many opportunities for organizations, including being ready to respond to the regulatory cha ....

Register to Download
CTA scaled

C-Suite Call to Action - Risk Management Through A Different Lens

This paper provides a quick overview and concrete action steps that will help organizations achieve superior outcomes over time. Traditional approaches that rely solely on point-in-time assessments can no longer keep up with rapidly changing or emerging risks. Determine how to make your program work ....

Register to Download
« Previous PageNext Page »