ThirdPartyTrust Blog

Morningstar & Uptake Discuss Vendor Risk Management Best Practices with Anders Norremo

Posted by Olivia Mandell on 7/31/17 8:55 AM

Commercial transactions and informational exchanges no longer represent linear processes between two parties; rather, the shared data travels past the involved entities and into each organizations expansive network of third and fourth party vendors. Through infiltrating these organizations, hackers are most often able to access the data of larger connected companies. According to a Soha Survey, 63% of all data breaches stem from vendor related attacks. IT experts predict that number of vendor related attacks will rise, as companies increasingly resort to outsourcing for innovation and expanded services.

Read More

Topics: Vendor Risk Management

At Morningstar Security Summit, Experts Discuss Vendor Risk Management

Posted by Olivia Mandell on 7/27/17 8:00 AM

      At the Morningstar Security Summit on June 26th, 2017, Morningstar's CIO and team gathered industry experts to discuss best practices in cyber security and risk assessment. Sessions throughout the day included: State of the Security Industry, Understanding Emerging Threats and Regulatory Trends, Amazon Web Services Security, Protecting What Matters and a panel discussion on "Should You Trust Your Third Party Vendors?."

Read More

Topics: Partnerships, Vendor Risk Management

Vendor Risk and the Regulatory Response

Posted by Olivia Mandell on 7/18/17 11:38 AM

            The attacks of 2016 & 2017 revealed the scope of cyber warfare is limitless, that no individual, no organization and no region is impenetrable. Over these past two years, hackers have targeted a diverse array of institutions. The National Security Agency, the Federal Bureau of Investigation, and the presidential campaigns in both the United States and in France are a few of many organizations to have experienced data breaches.

Read More

Topics: Regulation, Data Breaches, Vendor Risk Management

ThirdPartyTrust is a vendor risk management platform strengthening cyber risk intelligence and simplifying the management process for enterprises performing vendor risk assessments.
 
By analyzing both third and fourth party vendor cyber risk using a network-based solution, like 3PT, trust is built and mapped within your vendor eco-system.

Subscribe to Email Updates

Recent Posts