Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Cloud Security-1

    5 Risk Factors for Deciding Where to Host Cloud-Eligible Assets

    When security and risk considerations play a role in determining where Internet-facing assets should reside, the inevitable questions that rear their heads are 'Are my assets safer if they're ...
    campaign-creators-1167002-unsplash-1

    Making Risk Surface Real

    An argument for risk surface’s leading role in corporate risk registers By Richard Seiersen: Risk Management Author, Serial CISO, CEO Soluble
    carlos-irineu-da-costa-442504-unsplash

    What You Need to Know about the NYDFS Cybersecurity Regulations

    If you’re even loosely connected to the financial services industry, you’ve no doubt heard about the newest cybersecurity requirements issued by the New York State Department of Financial Services ...
    annie-spratt-608002-unsplash (1)

    What's Risk Surface?

    You’ve likely never heard the term “risk surface” before, but it’s an important concept that captures the way modern enterprises must manage risk. To that end, we’re providing an in-depth ...
    victoria-heath-367304-unsplash (1)

    How Universities Fail to Protect Student Data

    If there’s a lack of collegiate enthusiasm among today’s high schoolers, it’s not difficult to discover why: community colleges are woefully packed, universities are
    steinar-engeland-128831-unsplash

    What the Ascension Breach Means for You

    We’re well-versed in security breaches by now, but there’s still some uncertainty about whom to blame when things go wrong. A solid example of that is the recent Ascension Breach that involved ...
    Sin2

    Second Deadly Sin: Failing to make third-party risk management about business risk management

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the second deadly sin, which is failing to make third-party risk management ...
    playbook

    The Playbook for Managing Third-Party Security Risk

    Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window into how organizations are ...
    bram-naus-221602-unsplash

    Part 2: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Control Processes are Broken

    In the second part of this two-part blog series, we look at the reality of your risk processes. The complex, extensive vendor ecosystems in today’s enterprises ...
    nigel-tadyanehondo-196596-unsplash

    Part 1: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Measurements Are Incomplete

    You just received an updated security attestation from your third-party provider, but the hair on your arms stands straight up when news of the latest hack appears on your screen. Your vendors ...