Vendor Risk Management Insights

    iconemail-box

    Subscribe to our blog

    Security never sleeps. Get the most up-to-date information by subscribing to the RiskRecon blog.

    glenn-carstens-peters-190592-unsplash

    6 Tips for Administering Better Vendor Questionnaires

    To get the most from a vendor management program you must trust, then verify. These six best practices are a good place to begin. Questionnaires ...

    SC Magazine Unveils RiskRecon Review

    As vendor risk management becomes a more clear and present danger, the challenge for mitigating vendor risk is twofold:
    markus-spiske-772329-unsplash (1)

    How to protect yourself through the hazards of the M&A process

    The mergers and acquisitions process is scary enough, but absorbing another company’s digital assets without full visibility into their entire digital infrastructure is downright harrowing. This ...
    mike-tinnion-327565-unsplash

    2019 Cybersecurity Predictions

    VMblog.com, Virtualization Technology News and Information, recently posted some thought-provoking 2019 cybersecurity predictions from industry veteran Kelly White, CEO and Co-Founder of ...
    Sin2

    Third Deadly Sin: Not measuring and reporting risk and risk outcomes

    We’re running a blog post series on the “Seven Deadly Sins of Third-Party Cyber Risk Management;” here’s the third deadly sin, which is not measuring and reporting risk and risk ...

    Lockpath and RiskRecon Further Partnership to Increase Third-Party Risk Visibility

    Lockpath, a leading provider of integrated risk ...

    RiskRecon Advisor Yong-Gon Chon Shares Cybersecurity Tips

    In a recent article in the

    Who’s Monitoring Your Third-Party Vendors for Cyber Risk?

    Exactis Data Leak Illustrates the Enormity of an Organization’s Potential Third-Party Cyber Risk
    graphic-node-1652437-unsplash (1)

    You Can’t Manage What You Can’t Measure – Integrating Risk Formulas into Your Cyber Risk Management Framework

    By Kelly White | July 2, 2018 Calculating cyber risk is a key element of any sound risk management strategy. While traditional risk management models ...

    Breaking the Cybersecurity Insanity Cycle

    By Yong-Gon Chon | June 19, 2018 I’m joining the Board at RiskRecon because with my 20+ years of experience working in information security, I truly believe ...