Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Whistic-Blog-4-250

    What are the 'must-haves' when building a TPRM program?

    As organizations continue to come to grips with the fact that third-party risks are extremely dangerous to any business regardless of its size or industry - ...
    RiskRecon_Twitter_CyberSecurity-Breakthrough-Awards2021-250

    RiskRecon Wins 2021 Enterprise Risk Management Software of the Year

    RiskRecon, a Mastercard Company is proud to announce that we have been selected as the winner of the “Enterprise Risk Management Software of the Year" award ...
    RR-and-Privva-2

    Privva and RiskRecon Offer Comprehensive Vendor Risk System

    As part of Privva’s phase two integration of RiskRecon, Privva has incorporated RiskRecon data into the scoresheet allowing clients to validate vendor responses at a control ...

    Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program

    In part one of this short blog series we introduced the value the continuous monitoring can bring to a third-party risk management program and how you can start to introduce it into your practice. ...
    AdobeStock_141587175 (1)

    Part 1:  Incorporating Continuous Monitoring into Your Third-Party Risk Program

    Continuous monitoring is a valuable tool for organizations seeking to improve their cyber third-party risk ...
    AMCA multi-party cyber breach

    Multi-Party Incidents in the Headlines

    In May of 2019, the American Medical Collection Agency (AMCA) disclosed a breach of its systems that compromised the personal information of over 24 million individuals. Most of the individuals ...

    Digital Transformation and the Risk of Costly Cyber Ripples

    Layered software integrations, open APIs, and mutually beneficial data sharing between different businesses are hallmarks of digital transformation today. These technologies and practices serve as ...
    Vendor Risk Management

    GDPR Foundations: Part III

    Manage Third-parties under GDPR We’ve discussed this section in detail in a previous article, but in short, ...
    simplifying-data-compliance-regulations

    GDPR Foundations: Part I

    GDPR is an incredibly far-reaching regulation that has impacted organizations globally. The risk of financially material fines has led to companies making greater in their security & privacy ...
    CCPA third-party risk

    CCPA: Third-party Risk Management

    Historically, organizations haven’t had to publicly disclose the third parties they’ve hired to help them deliver a service, make money, etc. Under California’s new privacy law (CCPA), this ...