RiskRecon Blog

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    You Can’t Manage What You Can’t Measure – Integrating Risk Formulas into Your Cyber Risk Management Framework

    Calculating cyber risk is a key element of any sound risk management strategy. While traditional risk management models have focused on financial, process, workplace and IT factors, for many ...
    Number of third-party cyber risk relationship managed per analyst

    Security Vulnerabilities Don’t Equal Security Risk – So How Do You Prioritize?

    While security vulnerabilities are found in many technologies, their presence doesn’t necessarily equal risk. Borrowing the
    Number of third-party cyber risk relationship managed per analyst

    Why the Security of Your Vendor’s Entire Enterprise Matters

    Reliably protecting systems and data over time requires the disciplined execution of a robust security program that spans an entire enterprise. As a former CISO and now advisor to third-party risk ...

    What is the True Cost of Administering Your Vendor Security Questionnaire?

    The more questions you ask in your third party assessments, the higher the cost. But how much does an extra question really cost? And what is its value?
    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    The Playbook for Managing Third-Party Security Risk

    Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window into how organizations are confronting persistent breach risks stemming from third ...
    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    Why Third-Party Security Risk Matters

    Big Impact Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. ...
    Principles for Fair and Accurate Security Ratings

    Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

    Summary The Meltdown and Spectre vulnerabilities represent an entirely new class of security flaws that are deeply ...
    Extending GRC with Continuous Vendor Security Monitoring

    Principles for Fair and Accurate Security Ratings

    The U.S. Chamber of Commerce just issued “Principles for Fair and ...