Resources
Use these best practices to identify, manage and reduce cybersecurity risks at every stage of the...
06/13/2022 by Brad Hibbert
Prevalent's Brad Hibbert and John Masserini of TAG Cyber discuss how third-party risk management is evolving...
06/08/2022 by Brad Hibbert
Our new RFX Essentials solution automates, centralizes, and adds risk intelligence to vendor selection decisions, with...
06/02/2022 by Scott Lang
Use these seven best practices to speed identification, triage and mitigation of third-party, partner and software...
06/01/2022 by Scott Lang
Follow these three recommendations to put your TPRM program on the path to success.
05/05/2022 by Scott Lang
Focus on preparation, communication, and lessons learned to be better prepared for the next vendor breach...
05/02/2022 by Bob Wilkinson
A well-defined contract lifecycle management process enables you to streamline negotiations, ensure the consistency of terms...
04/27/2022 by Alastair Parr
Public companies will need to formalize their third-party risk management programs to meet new SEC reporting...
03/29/2022 by Scott Lang
Answer these four questions to determine if you are ready for a third-party cyber incident.
03/24/2022 by Scott Lang
Use these guidelines from TAG Cyber to add more structure and process to your third-party risk...
03/22/2022 by Scott Lang
Sorting through thousands of NIST security controls can be time-consuming. Use this guidance to focus on...
03/17/2022 by Thomas Humphreys
How to audit and report against SOC 2 and the Trust Service Principles with third-party risk...
03/16/2022 by Scott Lang
Prevalent believes that receiving a 97% score in reviewers’ Willingness to Recommend means that we are...
03/09/2022 by Scott Lang
A cyberattack against a key supplier halted production at several Toyota plants in Japan. Could your...
03/01/2022 by Scott Lang
Use this free questionnaire to determine your organization’s third-party risk exposure to the Russian invasion of...
02/25/2022 by Scott Lang
Prevalent Contract Essentials reduces costs and minimizes business risk by eliminating manual processes and incorporating contracts...
02/08/2022 by Scott Lang
Strengthen your resilience against software supply chain attacks by implementing these best practices for increasing third-party...
01/26/2022 by Scott Lang
Use this free questionnaire to determine your organization’s third-party risk exposure to the Apache Log4j vulnerability...
12/13/2021 by Scott Lang