Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    State-of-Compliance-in-TPRM-250

    Meeting Third-Party Risk Management Compliance Standards

    Many cybersecurity veterans will be quick to share the common wisdom that compliance does not equal effective cybersecurity risk ...
    TPRM-Differences-250

    TPRM Differences between North America and Western Europe

    Sponsored by RiskRecon, a Mastercard Company, and conducted by Ponemon Institute,1,162 IT and IT security professionals in North America and Western Europe were ...
    RiskExchange-250

    OneTrust partners with RiskRecon, a Mastercard Company to bring cybersecurity ratings to the OneTrust Third-Party Risk Exchange

    RiskRecon security ratings help organizations understand ...
    Realities-of-TPRM-250

    The realities of today’s third-party risk management programs

    Sponsored by RiskRecon, a Mastercard Company, and conducted by Ponemon Institute,1,162 IT and IT security professionals in North America and Western Europe were ...
    Ponemon-lack-of-visibility-250

    There is a lack of visibility into third-and-Nth party relationships

    Sponsored by RiskRecon, a Mastercard Company, and conducted by Ponemon Institute,1,162 IT and IT security professionals in North America and Western Europe were ...
    Ponemon report blog 2-fig 1- Oct 2022-1

    Ponemon Study: Shortfalls in Third-Party Risk Management Governance

    Sponsored by RiskRecon, a Mastercard Company and conducted by Ponemon Institute,1,162 IT and IT security professionals in North America and Western ...
    Ponemon data risk intro figure 1-1

    An Introduction to the Ponemon Data Risk in TPRM Study

    Organizations are dependent upon their third-party vendors to provide such important services as payroll, software development or data processing. ...
    Whistic-Blog-4-250

    What are the 'must-haves' when building a TPRM program?

    As organizations continue to come to grips with the fact that third-party risks are extremely dangerous to any business regardless of its size or industry - ...
    Whistic-Blog-3-250

    What does a successful TPRM program look like?

    Trading best practices across firms have been a staple in the cybersecurity industry for years. Everyone needs guidance and a helping hand once in a while. The same is true for third-party risk ...
    Cybersecurity-Deficit-blog-250

    What is cybersecurity deficit and how to deal with it?

    During a recent webcast with Kelly White, the founder of RiskRecon MasterCard company, ...