Vendor Risk Management Insights


      Subscribe to our newsletter

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon newsletter.

      Making Risk Surface Real

      What You Need to Know about the NYDFS Cybersecurity Regulations

      What's Risk Surface?

      How Universities Fail to Protect Student Data

      What the Ascension Breach Means for You

      RiskRecon Partners with RSA Archer

      6 Tips for Administering Better Vendor Questionnaires

      SC Magazine Unveils RiskRecon Review

      How to protect yourself through the hazards of the M&A process

      2019 Cybersecurity Predictions

      Product Enhancement: Vendor Information Header Update

      Product Enhancement:  Issue Risk Matrix for your Entire Vendor Portfolio

      Seventh Deadly Sin: Limiting vendor risk management to periodic assessments

      Sixth Deadly Sin: Trusting, but not verifying

      Fifth Deadly Sin: Not knowing your vendors

      Fourth Deadly Sin: Failure to address information security in third-party contracts

      Third Deadly Sin: Not measuring and reporting risk and risk outcomes

      Second Deadly Sin: Failing to make third-party risk management about business risk management

      RiskRecon Announces the Invention of Ground-Breaking Asset Risk Valuation Algorithms, Transforming How Enterprises Manage Third-Party Cyber Risk

      Blog Post Series: The Seven Deadly Sins of Third-Party Cyber Risk Management

      New Enhancements to RiskRecon Portfolio Dashboard

      Lockpath and RiskRecon Further Partnership to Increase Third-Party Risk Visibility

      RiskRecon Advisor Yong-Gon Chon Shares Cybersecurity Tips

      CEO of RiskRecon Weighs in on Vendor Risk Management

      Who’s Monitoring Your Third-Party Vendors for Cyber Risk?

      You Can’t Manage What You Can’t Measure – Integrating Risk Formulas into Your Cyber Risk Management Framework

      Breaking the Cybersecurity Insanity Cycle

      Security Vulnerabilities Don’t Equal Security Risk – So How Do You Prioritize?

      Join us for the Fair Institute Tech Sponsor Webinar Featuring RiskRecon Founder and CEO Kelly White

      Why the Security of Your Vendor’s Entire Enterprise Matters

      Meet with RiskRecon at the Financial Services-ISAC Annual Summit

      What is the True Cost of Administering Your Vendor Security Questionnaire?

      Public Customer Vendor References – Good Partnership but Risky Business

      When the media wrongly implicates you in a third-party data breach

      You Can’t Outsource Risk - A regulatory guide to third-party cyber security risk management

      We Are Proud To Announce Our Exclusive Partnership With the FAIR Institute.

      The Playbook for Managing Third-Party Security Risk

      Why Third-Party Security Risk Matters

      Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

      Principles for Fair and Accurate Security Ratings

      Extending GRC with Continuous Vendor Security Monitoring

      When Apache Struts2 Hits the Fan, Respond with Data and Collaboration

      Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf

      Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program: The Pilot is Complete – Now What?

      Part 1:  Incorporating Continuous Monitoring into Your Third Party Risk Program: Begin with the End State in Mind

      2017 Outlook: Vendor Risk Continues as a Top Challenge Faced by CISOs

      Part 2: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Control Processes are Broken

      Part 1: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Measurements Are Incomplete