Resources
This blog is the first in a series examining the causes and effects of high-profile third-party...
10/17/2019 by Tiffiany Newsome
The EBA Guidelines set out the internal governance arrangements that credit, payment, and electronic money institutions...
10/03/2019 by Scott Lang
Latest release integrates outside-in monitoring with inside-out assessment; extends TPRM data to other solutions via new...
09/30/2019 by Alastair Parr
The FCA defines guidance for selecting secure outsourced IT vendors. Discover the key criteria for compliance...
09/11/2019 by Scott Lang
The New York SHIELD Act will go into effect in March 2020 with several implications for...
08/27/2019 by Scott Lang
It is difficult to predict when or where data breaches will occur, but by utilizing a...
08/22/2019 by Melissa Miller
New flexible options to accommodate the required level of vendor oversight
08/15/2019 by Sara Muckstadt
30% of organizations in the auto industry do not have an established cyber security team, and...
08/13/2019 by Benjamin Aziza
Vendor Risk Assessments Are Essential to Satisfying Compliance Mandates.
08/13/2019 by Sara Muckstadt
Mobile network operator Sprint recently announced a serious security breach which exposed sensitive customer information. How...
07/23/2019 by Daniel Zhang
Since the GDPR's implementation, many compliance and risk leaders have encountered "gotchas" that reveal how basic...
07/12/2019 by Brenda Ferraro
AMCA pays the ultimate price for not securing its corporate clients’ private data
06/20/2019 by Sara Muckstadt
Lauren Weiner explores the importance of third-party risk management, through the analysis of real-life international third-party...
06/19/2019 by Lauren Weiner
Our first significant release of the platform since Prevalent acquired 3GRC is live. Discover release 3.11...
06/14/2019 by Alastair Parr
06/05/2019 by Scott Lang
06/04/2019 by Melissa Miller
05/29/2019 by Sara Muckstadt
05/21/2019 by Tiffiany Newsome