What we Do
What We Do
Vendor Risk Management Insights
Third Deadly Sin: Not measuring and reporting risk and risk outcomes
Second Deadly Sin: Failing to make third-party risk management about business risk management
RiskRecon Announces the Invention of Ground-Breaking Asset Risk Valuation Algorithms, Transforming How Enterprises Manage Third-Party Cyber Risk
Blog Post Series: The Seven Deadly Sins of Third-Party Cyber Risk Management
New Enhancements to RiskRecon Portfolio Dashboard
Lockpath and RiskRecon Further Partnership to Increase Third-Party Risk Visibility
RiskRecon Advisor Yong-Gon Chon Shares Cybersecurity Tips
CEO of RiskRecon Weighs in on Vendor Risk Management
Who’s Monitoring Your Third-Party Vendors for Cyber Risk?
You Can’t Manage What You Can’t Measure – Integrating Risk Formulas into Your Cyber Risk Management Framework
Breaking the Cybersecurity Insanity Cycle
Security Vulnerabilities Don’t Equal Security Risk – So How Do You Prioritize?
Join us for the Fair Institute Tech Sponsor Webinar Featuring RiskRecon Founder and CEO Kelly White
Why the Security of Your Vendor’s Entire Enterprise Matters
Meet with RiskRecon at the Financial Services-ISAC Annual Summit
What is the True Cost of Administering Your Vendor Security Questionnaire?
Public Customer Vendor References – Good Partnership but Risky Business
When the media wrongly implicates you in a third-party data breach
You Can’t Outsource Risk - A regulatory guide to third-party cyber security risk management
We Are Proud To Announce Our Exclusive Partnership With the FAIR Institute.
The Playbook for Managing Third-Party Security Risk
Why Third-Party Security Risk Matters
Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching
Principles for Fair and Accurate Security Ratings
Extending GRC with Continuous Vendor Security Monitoring
When Apache Struts2 Hits the Fan, Respond with Data and Collaboration
Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf
Part 2: Incorporating Continuous Monitoring into Your Third-Party Risk Management Program: The Pilot is Complete – Now What?
Part 1: Incorporating Continuous Monitoring into Your Third Party Risk Program: Begin with the End State in Mind
2017 Outlook: Vendor Risk Continues as a Top Challenge Faced by CISOs
Part 2: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Control Processes are Broken
Part 1: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Measurements Are Incomplete
Subscribe to Email Updates
Posts by Month
What we do