RiskReconPart 1: Are Your Vendors Walking the Walk?You just received an updated security attestation from your third-party provider, but the hair on your arms stands straight up when news of…Jul 8, 2017Jul 8, 2017
RiskReconPrinciples for Fair and Accurate Security RatingsThe U.S. Chamber of Commerce just issued “Principles for Fair and Accurate Security Ratings.” These ratings are the first-of-its-kind…Jun 21, 2017Jun 21, 2017
RiskRecon2017 Outlook: Vendor Risk Continues as a Top Challenge Faced by CISOsCISOs know that security risks abound. But objectively measuring risk and balancing it against the needs of the business is essential…Jun 12, 2017Jun 12, 2017
RiskReconPart 2: Incorporating Continuous Monitoring into Your Third-Party Risk Management Program: The…One of the most common questions we’re asked is how to incorporate continuous monitoring into a third-party risk management program. In…Jun 9, 2017Jun 9, 2017
RiskReconPart 1: Incorporating Continuous Monitoring into Your Third Party Risk Program: Begin with the End…Like many organizations today, you have existing processes, tools and people laser-focused on analyzing periodic vendor security…Jun 8, 2017Jun 8, 2017
RiskReconUsing Threat Intelligence to Manage Third Party Risk: The Boy Who Cried WolfMore and more enterprises are increasing their budgets for threat intelligence in order to stay on top of the latest security risks. The…Jun 5, 2017Jun 5, 2017
RiskReconExtending GRC with Continuous Vendor Security MonitoringWe speak with many clients that already have some form of governance, risk management, and compliance (GRC) program in place to assist with…May 31, 2017May 31, 2017
RiskReconWhen Apache Struts2 Hits the Fan, Respond with Data and CollaborationMitigating your third-party exposure to Apache Struts2 requires accurate, actionable data — and fast. If you can apply automated techniques…May 31, 2017May 31, 2017