Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Public Customer Vendor References – Good Partnership but Risky Business

    By Kelly White, Founder and CEO, RiskRecon A public testimonial from a satisfied customer is marketing gold for most ...

    When the media wrongly implicates you in a third-party data breach

    Be Prepared: The Media Might Drag you into a Vendor Data Breach Mess Even if Your Data Wasn’t Compromised Kelly White | May 1, 2018 When your vendor ...

    You Can’t Outsource Risk - A regulatory guide to third-party cyber security risk management

    Kelly White | April 29, 2018 Third parties are integral to the value chain—any given organization ...

    We Are Proud To Announce Our Exclusive Partnership With the FAIR Institute.

    We are proud to announce an exclusive partnership with the FAIR Institute. Factor Analysis of Information Risk (FAIR) has emerged as the standard Value at Risk (VaR) framework for ...

    The Playbook for Managing Third-Party Security Risk

    Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window into how organizations are ...

    Why Third-Party Security Risk Matters

    Big Impact Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. ...

    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    Summary The Meltdown and Spectre vulnerabilities represent an ...
    annie-spratt-450567-unsplash

    Principles for Fair and Accurate Security Ratings

    The U.S. Chamber of Commerce just issued “Principles for Fair and Accurate Security ...
    matthew-henry-87142-unsplash

    Extending GRC with Continuous Vendor Security Monitoring

    We speak with many clients that already have some form of governance, risk management, and compliance (GRC) program in place to assist with managing their enterprise programs. And some have ...

    When Apache Struts2 Hits the Fan, Respond with Data and Collaboration

    Mitigating your third-party exposure to Apache Struts2 requires accurate, actionable data -- and fast. If you can apply automated techniques to rapidly identify which of your vendors are most ...