Papers

Geopolitical Risk

Guide: Geopolitical Risk - Spotlight on the Russia/Ukraine Conflict

Geopolitical risk stems from war, terrorism, and even ongoing tensions between states that derail normal and peaceful international relations. Geopolitical risk has an adverse impact on the delicate balance of the world’s economy, security, and political relations. What does geopolitical ri ....

Register to Download
Guide Risk Domains

Guide To Risk Domains For Vendor Risk Management

Guide To Risk Domains This guide introduces and defines nineteen of the most critical and current risk domains within four key areas. The guide describes why organizations need to acknowledge each risk domain and offers concrete suggestions of how organizations can account for risks presented by ea ....

Register to Download
taxonomy

A Unified Third Party Continuous Monitoring Cybersecurity Taxonomy

This paper provides a unified continuous monitoring cybersecurity taxonomy. A living document designed to evolve with the cybersecurity landscape, the taxonomy advances communication about evaluating and monitoring the impact of cyber threats. Cybersecurity monitoring solution providers, outsourcers ....

Register to Download
SIG privacy

Privacy Resources For Vendor Risk Management

Data Privacy Scoping Template Given the pace and complexity of data protection regulations, Shared Assessments provides a free, scoped Privacy Standardized Information Gathering (SIG) Questionnaire mapped to privacy frameworks. This template helps organizations complete third party data privacy r ....

Register to Download
log4j laptop 1

Log4j Vulnerability Resources For Vendor Risk Management

Scoping Template Shared Assessments has released a free Standardized Assessment Tool for the Log4j risk. With this scoping template, you will be able to conduct your own vulnerability assessment and share the form with your vendors for a holistic view of Log4j risk across your supply chain. Registe ....

Register to Download

Complex Supply Chains - Gaining Visibility into Nth Party Governance

This briefing paper provides insight into gaining greater supply chain sovereignty by identifying critical dependencies across both inbound and outbound supply chains. Adopting this proactive stance provides many opportunities for organizations, including being ready to respond to the regulatory cha ....

Register to Download
CTA scaled

C-Suite Call to Action - Risk Management Through A Different Lens

This paper provides a quick overview and concrete action steps that will help organizations achieve superior outcomes over time. Traditional approaches that rely solely on point-in-time assessments can no longer keep up with rapidly changing or emerging risks. Determine how to make your program work ....

Register to Download
complex chain

Adaptive Risk Management for Complex Supply Chains

This briefing paper provides a foundation for a more robust TPRM style – one that applies complex adaptive systems to the field of risk management to help practitioners understand step-function, cascading improvements in risk management processes they can apply to their own programs. The related ....

Register to Download
Spring4Shell

Using the SCA in Complement with Other Assessments: Streamlining Due Diligence

This Building Best Practices resource: Examines how to improve due diligence assessment productivity. Identifies a strong strategy that leverages control verification reports. Documents a means of examining existing artifacts to more efficiently scope any remaining due diligence. A p ....

Register to Download
ERM Featured Image

The Role of ERM in Managing Risks Related to New Technologies

The Role of ERM in Managing Risks Related to New Technologies and its companion Executive Summary document examine the challenges that come with significant technology shifts, such as IoT, AI, 5G and quantum encryption and computing; and the valuable role that the board and C-suite can play in helpi ....

Register to Download
« Previous PageNext Page »