What we Do
What We Do
Vendor Risk Management Insights
Breaking the Cybersecurity Insanity Cycle
Security Vulnerabilities Don’t Equal Security Risk – So How Do You Prioritize?
Join us for the Fair Institute Tech Sponsor Webinar Featuring RiskRecon Founder and CEO Kelly White
Why the Security of Your Vendor’s Entire Enterprise Matters
Meet with RiskRecon at the Financial Services-ISAC Annual Summit
What is the True Cost of Administering Your Vendor Security Questionnaire?
Public Customer Vendor References – Good Partnership but Risky Business
When the media wrongly implicates you in a third-party data breach
You Can’t Outsource Risk - A regulatory guide to third-party cyber security risk management
We Are Proud To Announce Our Exclusive Partnership With the FAIR Institute.
The Playbook for Managing Third-Party Security Risk
Why Third-Party Security Risk Matters
Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching
Principles for Fair and Accurate Security Ratings
Extending GRC with Continuous Vendor Security Monitoring
When Apache Struts2 Hits the Fan, Respond with Data and Collaboration
Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf
Part 2: Incorporating Continuous Monitoring into Your Third-Party Risk Management Program: The Pilot is Complete – Now What?
Part 1: Incorporating Continuous Monitoring into Your Third Party Risk Program: Begin with the End State in Mind
2017 Outlook: Vendor Risk Continues as a Top Challenge Faced by CISOs
Part 2: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Control Processes are Broken
Part 1: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Measurements Are Incomplete
Subscribe to Email Updates
Posts by Month
What we do