Jan 20, 2021 3 min read
4 Key Steps to Your Third-Party Risk Management Process
If you’re like most organizations, you are highly dependent on third-party vendors to efficiently run your business. On the flip side, vendors present risks which can have serious legal, financial and business repercussions, making vendor risk assessments more essential than ever. But how do you effectively manage hundreds, if not thousands, of vendors? Here are four key steps that should...
Jan 14, 2021 4 min read
What You Need to Know About Supply Chain Attacks
As the world was finally counting down to a new and brighter 2021, the attack on SolarWinds, one of the most significant supply chain attacks in recent history, closed an already challenging year with a thunderous bang. This supply chain attack was quite extensive, affecting more than 250 federal agencies and businesses and setting off alarms about the vulnerability of...
Dec 31, 2020 5 min read
5 Features to Have in Your Third-Party Security Risk Management Platform
If 2020 has taught businesses anything, it’s to “expect the unexpected.” The COVID-19 pandemic showed the world just how ill-prepared we really were for a disruption of this magnitude. As we enter 2021, resolve to protect your assets by employing a third-party security risk management platform and watch your old, manual process quickly transform into an efficient, streamlined one. So...
Dec 22, 2020 3 min read
5 Key Considerations for Third-Party Risk Monitoring
Companies are finally understanding the importance of having a full due diligence process in place to assess their third-party vendors. But an essential part of the third-party risk management process is what happens at the end: Once you’ve finished assessing your vendors; you need to monitor them. This proactive approach will alert you of any potential or new risks that...
Nov 24, 2020 4 min read
How Improved Vendor Collaboration and Communication Can Actually Reduce Cyber Risk
Remember when “Telephone” referenced a game you played with your childhood friends? “Telephone” in the workplace, especially between you and your vendors, is anything but fun and games. It is the cause of much frustration, inefficiencies and unnecessary risk to your organization. In recent years, businesses have greatly increased their reliance on vendors. Ideally, working with vendors enables businesses to...
Nov 12, 2020 4 min read
4 Reasons You Should Perform a Third-Party Cyber Risk Assessment
What do Instagram, Marriot and General Electric have in common? All three experienced third-party vendor data breaches in 2020. It’s pretty much impossible to find a company today that is not reliant on third-party vendors for products or services. Vendors offer organizations the ability to reduce costs and improve efficiency. Unfortunately, the same vendors may also carry risk for these...
Nov 10, 2020 3 min read
5 Ways Panorays’ Integrations Benefit Your Security Management Process
Recently, Panorays announced exciting new integrations with RSA Archer and ServiceNow. While this new functionality paves the way to more efficient organizational workflows, it also provides many additional benefits as well. How will these integrations enhance your ability to manage the third-party security posture of your vendors? Here are five benefits to consider. 1. Ease of Use As a SaaS-based platform...
Nov 26, 2019 3 min read
3 Key Points About CCPA
What is CCPA? The California Consumer Privacy Act (AB 375), which will go into effect on January 1, 2020, is expected to significantly strengthen data collection and privacy in the USA. Similar to the way the General Data Protection Regulation (GDPR) defined data privacy in Europe, the CCPA regulation is expected to set the standard for data privacy in...
May 08, 2019 3 min read
3 Reasons Why Enterprises Hate Security Questionnaires
It’s not hard to understand why security questionnaires are necessary. Because regulations like GDPR and NYDFS are holding businesses accountable for their third parties’ cybersecurity, it’s important for enterprises to assess and continuously monitor all vendors, suppliers and business partners. And the initial vetting of any third parties typically begins with a comprehensive security questionnaire to evaluate cyber posture. (more…)