HIPAA Compliance vs. Security…Why Not Both?
Happy Birthday, HIPAA! An Ode to the Intersection of Compliance and Security The recent celebration of HIPAA’s birthday inspired us...
Read MoreTPRM 101- Your guide to creating a Third-Party Risk Management Program
What is a TPRM strategy and what is the ideal workflow for getting started? Outsourcing or the use of third parties inherently comes with...
Read MoreIncident Response Self-Assessment
Incidents Happen, How Prepared is Your Organization? The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...
Read MoreA Day in the Life of a TPRM Analyst
Keys to A Successful Onsite Vendor Assessment for your TPRM program
How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...
Read MoreUnderstand the role fourth-party vendors play in your risk profile
Don’t let attackers in through your fourth-party vendors Your third-party vendors have their own third-party vendors. Those are your fourth-party...
Read More6 Ways to Get Started with Your Fourth-Party Vendor Program
6 Ways to Get Started with Your Fourth-Party Vendor Program What is Fourth-Party Vendor Risk Management? According to expert studies, more than...
Read MoreHow the CMMC Shows a Greater Focus on Third-Party Risk Management
3 Ways to Prepare for CMMC
3 Ways to Prepare for CMMC The Cybersecurity Maturity Model Certification (CMMC) is a recent mandate from the Department of Defense (DoD) for all vendors to...
Read MoreInherent Risk Tiering for Third-Party Vendor Assessments
Importance of Third-Party Risk Tiering It can be a challenging and overwhelming task to adequately manage the risk associated...
Read More