Resources

The Future of Operational Due Diligence (ODD) Automation: A Framework For the Next Gen Platform

Are you in the performing operational due diligence, or facing challenges with your ODD operations? Here are some keys to understanding and updating the process.

What is Operational Due Diligence?

Learn just what is operational due diligence, who initiates it, it's key objectives, main steps, and some frequently asked questions about it.

FTC Issues Timely Reminder on Data Security Oversight Role of Corporate Boards of Directors

Find out Federal Trade Commission's recommendations to help all directors enhance their cybersecurity oversight role.

The New Normal: The Ubiquiti IoT Breach and Future-Proofing Your Third-Party Risk Management (TPRM) Program

The recent Ubiquiti IoT breach revealed the impact of third-party vendors on your organizations. Here's how to future-proof your TPRM program against similar threats.

Cyber Risk Consulting Market Forecast: 5 Factors Driving Growth

From the rise in cyber attacks to new technologies and the pandemic, here are our projections for the cyber risk consulting market.

Modernizing Vendor Risk Management (VRM): Best Practices to Automate Vendor Onboarding, Due Diligence, Supply Chain Resiliency

Vendor onboarding and due diligence are crucial VRM steps. Check out the best practices to modernize and automate your VRM activities and functions.

Virginia is For Privacy, Part 2

Find out what your company needs to know about the Data Protection Assessment requirements under Virginia's new Consumer Data Protection Act, as we continue our series, Virginia is For Privacy.

Reducing Cyber Risk With Minimal Resources: Maximizing Efficiency for Consultants

Wondering how you can provide cost-effective cyber risk assessment services? Check out these valuable tips to reduce cyber risk with minimal resources.

Vendor Risk Management Processes for Enterprise Supply Chains: Why Microsoft Excel is Not Enough

Enterprise VRM is a comprehensive process, and MS Excel is not the right tool for the job. In this post, we’ve discussed the reasons why spreadsheets are not enough for the VRM process.

Virginia is For Privacy, Part 1

3 Basic Things to Know About Virginia’s New Consumer Data Protection Act. Learn about Consumer Data Protection Act and how it affects your company's policies, notices, procedures, and processes.

The Evolving Third-Party Data Breach Landscape: What's Going On and How to Protect Your Data With Vendor Risk Management Software

Find out how the third-party data breach landscape changes and what techniques malicious actors use to steal data. Learn how you can protect your data with vendor risk management software.

Supply Chain Risk Management (SCRM) in the Manufacturing Industry: How to Identify, Assess, and Remediate Third-Party Risk Up and Down the Chain

Learn how the manufacturing industry's supply chain threats are evolving. How to identify, assess, and mitigate third-party risks to secure your manufacturing business.

Third Party Risk Management Lessons Learned from Recent Accellion Breach

Find out the lessons we can learn from Accellion Breach and know the Third Party Risk Management best practices takeaways.

Third-Party Risk Management Solutions for Software Supply Chains

Learn the features that you should consider in looking for a supply chain risk management platform for your software vendors.

Identifying Third-Party Risk in Your Supply Chain: Best Practices for Vendor Due Diligence

Find out the critical steps of vendor risk due diligence. From collecting business information to assessing security and legal risks, this guide has got you covered.

Comprehensive Vendor Risk Management (VRM): How to Conduct a Cyber Security Risk Assessment

Discover how to conduct a cybersecurity assessment and how it can protect your organization.

What is Third-Party Risk Management (TPRM)?

Learn more about Third-party risk management (TPRM) and the common types of vendor risk. We'll share some examples of regulatory frameworks around third-party risk, and how to best mitigate third-party risk for your organization.

Sealing the Deal on Another Privacy Settlement

FTC Announces Settlement with Travel Services Company Over Unsecured Cloud Database and Misleading Online Privacy Messaging

Resolve to Enhance Your Company’s Vendor Oversight Practices in 2021

Mortgage Industry Data Analytics Company Settles FTC Allegations that it Failed to Ensure Vendor was Adequately Protecting the Personal Information of Consumers

Resolve to Prepare for Supply Chain Cyber Attacks with Better Vendor Risk Management Practices in 2021

Recent attacks highlight importance of proactive and preventive measures to counter intrusions through your supply chain.

Get ready: The CCPA is now the CPRA

CPRA was voted into law on November 3, 2020 by 56% of the Golden State’s voters. 9 million Californians voted in favor of these new consumer privacy protections.

  • {index}
  • {title}

    {content}