Vendor Risk Management Insights


      Subscribe to our blog

      Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

      Cloud Security-1

      5 Risk Factors for Deciding Where to Host Cloud-Eligible Assets

      When security and risk considerations play a role in determining where Internet-facing assets should reside, the inevitable questions that rear their heads are 'Are ...

      Making Risk Surface Real

      An argument for risk surface’s leading role in corporate risk registers By Richard Seiersen: Risk Management Author, Serial CISO, CEO ...

      What You Need to Know about the NYDFS Cybersecurity Regulations

      If you’re even loosely connected to the financial services industry, you’ve no doubt heard about the newest cybersecurity requirements issued by the New York State ...
      annie-spratt-608002-unsplash (1)

      What's Risk Surface?

      You’ve likely never heard the term “risk surface” before, but it’s an important concept that captures the way modern enterprises must manage risk. To that end, ...
      victoria-heath-367304-unsplash (1)

      How Universities Fail to Protect Student Data

      If there’s a lack of collegiate enthusiasm among today’s high schoolers, it’s not difficult to discover why: community colleges are woefully packed, universities ...

      What the Ascension Breach Means for You

      We’re well-versed in security breaches by now, but there’s still some uncertainty about whom to blame when things go wrong. A solid example of that is the recent ...

      Second Deadly Sin: Failing to make third-party risk management about business risk management

        We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the second deadly sin, which is failing to ...

      The Playbook for Managing Third-Party Security Risk

      Get our All-New Playbook reflecting real life data from executives of 30 companies that offers a window ...

      Part 2: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Control Processes are Broken

      In the second part of this two-part blog series, we look at the reality of your risk processes. The complex, extensive vendor ...

      Part 1: Are Your Vendors Walking the Walk? Confronting Risk Realities: Your Measurements Are Incomplete

      You just received an updated security attestation from your third-party provider, but the hair on your arms stands straight up when news of the latest hack ...