Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program

    In part one of this short blog series we introduced the value the continuous monitoring can bring to a third-party risk management program and how you can start to introduce it into your practice. ...
    AdobeStock_141587175 (1)

    Part 1:  Incorporating Continuous Monitoring into Your Third-Party Risk Program

    Continuous monitoring is a valuable tool for organizations seeking to improve their cyber third-party risk ...
    GDPRGavel

    GDPR: Third-party Risk Management Obligations

    Historically, organizations have sometimes been able to shift some liability for data breaches to their third-parties, if not all liability (this has been especially true for payment data ...
    campaign-creators-1167002-unsplash-1

    Making Risk Surface Real

    An argument for risk surface’s leading role in corporate risk registers By Richard Seiersen: Risk Management Author, Serial CISO, CEO Soluble
    carlos-irineu-da-costa-442504-unsplash

    What You Need to Know about the NYDFS Cybersecurity Regulations

    If you’re even loosely connected to the financial services industry, you’ve no doubt heard about the newest cybersecurity requirements issued by the New York State Department of Financial Services ...
    nathan-dumlao-572047-unsplash-1

    Join us for the Fair Institute Tech Sponsor Webinar Featuring RiskRecon Founder and CEO Kelly White

    RiskRecon Founder and CEO Kelly White will be presenting a FAIR Institute Tech Sponsor Webinar titled "
    matthew-henry-87142-unsplash

    Extending GRC with Continuous Vendor Security Monitoring

    We speak with many clients that already have some form of governance, risk management, and compliance (GRC) program in place to assist with managing their enterprise programs. And some have ...
    octav-cado-508490-unsplash-1

    When Apache Struts2 Hits the Fan, Respond with Data and Collaboration

    Mitigating your third-party exposure to Apache Struts2 requires accurate, actionable data -- and fast. If you can apply automated techniques to rapidly identify which of your vendors are most ...
    adi-goldstein-1384102-unsplash

    Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf

    More and more enterprises are increasing their budgets for threat intelligence in order to stay on top of the latest security risks. The dramatic increase in third party cyber security risk ...
    kaleidico-754517-unsplash-1

    2017 Outlook: Vendor Risk Continues as a Top Challenge Faced by CISOs

    CISOs know that security risks abound. But objectively measuring risk and balancing it against the needs of the business is essential. Third-party risk provides a perfect ...