Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Digital Transformation and the Risk of Costly Cyber Ripples

    Layered software integrations, open APIs, and mutually beneficial data sharing between different businesses are hallmarks of digital transformation today. These technologies and practices serve as ...

    Come See One of the Top Startups at RSAC 2020

    Are you heading to RSAC 2020? Why not come and meet with the #2 startup to see at RSAC as ranked by Crunchbase.

    What is Third-Party SecOps?

    Organizations like NIST and ISO have put together structures to build effective enterprise security programs. Why should third-party risk management be any different?

    RiskRecon Commits to Continued Innovation

    Third-party cyber risk needs are always evolving and RiskRecon is committed to providing industry-leading customer service, technological innovation, and now, enhanced cyber threat intelligence as ...
    ITSPmagazine+LOGO+-+Square+v2

    A Conversation on Digital Transformation and Third-Party Risk

    Only a small segment of the industry has gotten on board with the idea that they own the risk associated with the end-to-end supply chain that makes their business run. Many focus on ...
    7_deadly_sins

    Seventh Deadly Sin: Limiting vendor risk management to periodic assessments

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the last deadly sin, which is limiting vendor risk management to periodic ...
    sean-pollock-203658-unsplash

    Why the Security of Your Vendor’s Entire Enterprise Matters

    By Kelly White | May 14, 2018 Reliably protecting systems and data over time requires the disciplined execution of a ...
    playbook

    The Playbook for Managing Third-Party Security Risk

    Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window into how organizations are ...
    shahadat-shemul-1532385-unsplash

    Why Third-Party Security Risk Matters

    Big Impact Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. ...
    jeshoots-com-632498-unsplash

    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    Summary The Meltdown and Spectre vulnerabilities represent an ...