third party risk

Results 26 - 40 of 40Sort Results By: Published Date | Title | Company Name

Third-Party Risk: Why Real-Time Intelligence Matters

Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future

Know Your Weakest Links: 2 Steps to Managing Third-Party Risk

Published By: Recorded Future     Published Date: Apr 18, 2019
A very high level look into managing third-party risk in infographic format
Tags : 
    
Recorded Future

3 Ways To Reduce Third-Party Application Risk and Strategies to Protect Endpoints

Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware
    
Lumension

4 Fundamental Steps to Creating an Effective Third Party Compliance Programs

Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this whitepaper to learn the 4 fundamental steps to creating an effective third party compliance program like the elaborate, richly funded programs that are so prominent in the news.
Tags : 
compliance, benchmark, compliance programs, case management, hotline data benchmarking, ethics and compliance, third party compliance, risk assessment
    
NAVEX Global

Key Trends, Issues and Best Practices in Compliance 2013

Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver
    
NAVEX Global

A Prescriptive Guide to: Third Party Risk Management

Published By: NAVEX Global     Published Date: Mar 04, 2014
Almost every company has some, many or all of the elements of an effective third party compliance program. The challenge is to identify what you have. This whitepaper can help you identify.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
NAVEX Global

Top Ten Ethics & Compliance Predictions and Recommendations for 2014

Published By: NAVEX Global     Published Date: Mar 04, 2014
Review the past year and identify key trends with an eye towards planning for the year ahead with the recommendations of this research whitepaper.
Tags : 
navex global, compliance program, third party risk management, risk management, compliance implementation, effective compliance, identify and prioritize, risk assessment
    
NAVEX Global

What You Need To Know About Vendor Risk Management In Financial Institutions

Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, knowledge management
    
BitSight Technologies

3 Strategies to Protect Endpoints from Risky Applications

Published By: Lumension     Published Date: Aug 15, 2010
Though most organizations have invested considerable time and effort in improving their endpoint risk management processes, many of them are ill-equipped to handle the myriad of third-party applications that are increasingly introducing the most risk into today's IT environment.
Tags : 
cyber security, application security, risk management, third party applications, endpoint security, cyber crime, anti virus, hacker detection
    
Lumension

Anti-Bribery and Corruption Risk Assessment Checklist

Published By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : 
anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
    
NAVEX Global

Definitive Guide To Third Party Risk Management

Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global

Prefabricated Data Centers: Business Advantages for Colocation Providers

Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability
    
Schneider Electric

Bribery and Corruption Red Flags “How to Respond to Corruption Indicators”

Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, security, software development, it management, knowledge management, enterprise applications, platforms, storage
    
BitSight Technologies

The Evolution of Vendor Risk Management in Financial Institutions

Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management, it career advancement, business technology, data center
    
BitSight Technologies
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.