Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    Third-Party Risk Management and ISO 20071

    In mid-2019, a medical testing company was informed by one of its vendors that the vendor had experienced a significant data breach. This data breach involved ...

    The Analyst View: Measurement and Reporting

    In the final blog of our three-part series, guest authored by Forrester senior analyst Paul McKay, we discuss what third-party risk information is being shared ...

    Jesse Card - RiskRecon's Founding Developer

    By: Kelly White, Founder and CEO, RiskRecon

    The Analyst View: Operationalization and Value

    In this second blog of our three-part series, guest authored by Forrester senior analyst Paul McKay, we discuss the difference in remediation efforts between third-party cyber risk and standard IT ...

    The Analyst View: Why Cybersecurity Risk Ratings Technology Matters

    RiskRecon recently ran a webinar with Forrester senior analyst Paul McKay and Kelly White, Founder & CEO of RiskRecon, that focused on how the cybersecurity risk ...

    The Maturity of Third-Party Risk Management

    While conventional approaches to third-party risk management remain unchanged, the industry is transitioning to a new "normal," says RiskRecon CEO Kelly White.

    RiskReconer: Deepak Jeevankumar - CEO Builder

    By: Kelly White, Founder and CEO, RiskRecon If you are starting a cybersecurity company, you will be very fortunate if you win the seed ...
    Cloud Security-1

    5 Risk Factors for Deciding Where to Host Cloud-Eligible Assets

    When security and risk considerations play a role in determining where Internet-facing assets should reside, the inevitable questions that rear their heads are 'Are my assets safer if they're ...
    Sin6

    Sixth Deadly Sin: Trusting, but not verifying

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management,” here’s the sixth deadly sin, which is trusting but not verifying.
    Sin5

    Fifth Deadly Sin: Not knowing your vendors

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the fifth deadly sin, which is not knowing your vendors.