RiskRecon

Recent Posts

Lockpath and RiskRecon Further Partnership to Increase Third-Party Risk Visibility

Posted by RiskRecon on Sep 18, 2018 11:31:11 AM

 

Lockpath, a leading provider of integrated risk management solutions, today announced the availability of the integration between its award-winning Keylight Platform and RiskRecon, a SaaS-based third-party cyber risk monitoring solution that delivers objective insights into third-party security performance and IT landscape. This product integration aims to enable precise, efficient reduction and elimination of organizations’ most critical third party security gaps.

Read More

Topics: Third Party Risk, Vendor Security, Vendor Risk Management

RiskRecon Advisor Yong-Gon Chon Shares Cybersecurity Tips

Posted by RiskRecon on Aug 30, 2018 2:56:12 PM

 

In a recent article in the ABA Journal, noted cybersecurity expert and RiskRecon Advisor, Yong-Gon Chon, shared his thoughts on what law firms can do to bolster their cybersecurity. In particular, Chon suggests learning from other industries. For example, law firms can look to financial institutions, which have long struggled with protecting data as required under the Gramm-Leach-Bliley Act, he said. Data protection is key.

Read More

Topics: Third Party Risk, Vendor Security, Vendor Risk Management, risk measurements, 3rd party risk management

CEO of RiskRecon Weighs in on Vendor Risk Management

Posted by RiskRecon on Jul 10, 2018 11:48:49 AM

 

RiskRecon CEO and Founder Kelly White talks to Data Breach Today about a new initiative by the Cyber Readiness Institute that aims to address vendor risk by promoting to smaller enterprises the cybersecurity best practices used by Fortune 500 companies.

Read More

Topics: Vendor Security, Vendor Risk Management

Who’s Monitoring Your Third-Party Vendors for Cyber Risk?

Posted by RiskRecon on Jul 6, 2018 4:07:55 PM

 

Exactis Data Leak Illustrates the Enormity of an Organization’s Potential Third-Party Cyber Risk

With hundreds and thousands of complex, highly interdependent, Internet-connected systems, it’s no wonder that an enterprise’s potential third-party cyber risk has multiplied in recent years. 

Read More

Topics: Third Party Risk, Vendor Security

Join us for the Fair Institute Tech Sponsor Webinar Featuring RiskRecon Founder and CEO Kelly White

Posted by RiskRecon on May 23, 2018 2:14:34 PM

 

RiskRecon Founder and CEO Kelly White will be presenting a FAIR Institute Tech Sponsor Webinar titled "Solving third-party risk at scale - a true risk-based approach" on Friday May 18th at 3 pm EST. 

Read More

Topics: Vendor Security, Webinar, Third Party Risk, CISO, 3rd party risk management

Meet with RiskRecon at the Financial Services-ISAC Annual Summit

Posted by RiskRecon on May 11, 2018 2:52:01 PM

 

May 20th to 23rd RiskRecon will be a sponsor at the 2018 Financial Services - Information Sharing and Analysis Center Annual Summit in Boca Raton, Florida at the Waldorf Astoria Boca Raton Resort. 

Read More

Topics: Press Release, Vendor Risk Management, risk measurements, 3rd party risk management

We Are Proud To Announce Our Exclusive Partnership With the FAIR Institute.

Posted by RiskRecon on Apr 13, 2018 12:17:09 PM

We are proud to announce an exclusive partnership with the FAIR Institute. Factor Analysis of Information Risk (FAIR) has emerged as the standard Value at Risk (VaR) framework for cybersecurity and operational risk. The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.  

 

Read More

Topics: Third Party Risk, Press Release, 3rd party risk management, Vendor Risk Management

The Playbook for Managing Third-Party Security Risk

Posted by RiskRecon on Mar 21, 2018 12:02:49 PM

Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window into how organizations are confronting persistent breach risks stemming from third parties.

We are excited to announce the release of our inaugural Third-Party Security Risk Management Playbook. An inside look at how real companies are managing third party cyber risk. To get this important information we have conducted in-depth interviews with security executives from 30 participating organizations across multiple industries. The Playbook reveals how companies are managing the security risks of their complex digital supply chains and sensitive business partnerships.  Our study identified 14 vendor-neutral capability sets comprising 72 common, emerging, and pioneering practices that firms have implemented to manage third-party security risk. As a study of real-world third-party risk management programs, the Playbook is a valuable tool executives can use to benchmark their own programs and gain insight into pioneering practices other firms are adopting.

 

Read More

Topics: Third Party Risk, Vendor Security, 3PRM, Vendor Risk Management, 3rd party risk management, risk transparency, risk exposures, risk measurements, Whitepaper

Why Third-Party Security Risk Matters

Posted by RiskRecon on Mar 8, 2018 3:10:08 PM

Big Impact
Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. Are they trustworthy? Why? Why not? What should be done about it? These questions are yours to answer and execute on. A breach of your third-party is a breach of your enterprise.

Big Challenges
Third-party risk management is hard. It requires deep transparency, strong accountability, and effective collaboration. Third-party risk has to achieve this position with hundreds and even thousands of organizations while being an outsider to every organization. Additionally, third-party risk has to solve this with limited personnel and resources. This need—to achieve really good risk outcomes from the outside with limited resources —will result in dramatic risk management innovation, key of which will be development of machine learning and artificial intelligence-based risk assessment capabilities. These inventions will occur within the context of third-party risk management and be adopted by enterprises for internal risk management. Necessity is the mother of invention, and the necessity is pressing in a big way.

The Greater Good
Third-party risk management is a process of holding enterprises accountable to good security practices. As you improve the security of your third parties you improve the security of the Internet. It decreases the likelihood of data being breached. It decreases the likelihood of systems being turned into DDOS drones or malware servers. It increases the likelihood that systems are going to be consistently available to fulfill their intended purposes. The work of third-party risk management is work for the greater good.

Read More

Topics: Continuous Monitoring, 3rd party risk management, Security Ratings, Vendor Security, 3PRM, Third Party Risk

Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

Posted by RiskRecon on Jan 17, 2018 6:49:26 PM

Summary

The Meltdown and Spectre vulnerabilities represent an entirely new class of security flaws that are deeply rooted in long-standing CPU architecture. As such, Meltdown and Spectre are likely the first of many issues that will have to be dealt with quickly as research in CPU security flaws intensifies. Tactically, it is important that you ensure your third-parties implement the necessary patches. Strategically, it is essential that you reassess your standards governing third-party use of cloud-hosting providers and implement measures to bring your third-parties into compliance with the updated standards. 

In this document, we provide a brief explanation of the Meltdown and Spectre vulnerabilities and why they are so impactful, particularly to cloud computing. We also suggest a tactical plan for addressing the issue with your third-parties, and recommend strategic considerations for your larger third-party risk-governance program.

 

Read More

Topics: Continuous Monitoring, 3rd party risk management, Security Ratings, Vendor Security, 3PRM, Third Party Risk