Blog & Resources

Complex Supply Chains – Gaining Visibility into Nth Party Governance

Read More

Complex Supply Chains – Gaining Visibility into Nth Party Governance

This briefing paper provides insight into gaining greater supply chain sovereignty by identifying critical dependencies across both inbound and outbound supply chains. Adopting this proactive…

Nth Party Suppliers – Gaining a Toehold on Down Chain Providers

Supply chain sovereignty depends on a high degree of visibility into Nth Party Suppliers in order to identify critical dependencies and then apply a consistent…

Nth Party Metrics to Recognize and Mitigate Risks in Vendor Chains Supporting Critical Services

Identifying key metrics can be a thorny proposition. In order to meet the expanding definition of fourth/Nth parties as “material,” it is essential on a…

Nth Party Metrics to Recognize and Mitigate Risks in Vendor Chains Supporting Critical Services

Identifying key metrics can be a thorny proposition. In order to meet the expanding definition of fourth/Nth parties as “material,” it is essential on a…

How to Prevent Third Party Risk Management from Running Aground

Before the massive container ship Ever Given was dislodged from the banks of the Suez Canal, the event captured global attention and triggered enlightening refresher…

Crisis Management and Communications: Prepared Makes Perfect

While the scope and nature of an organizational emergency is hard to predict, between the COVID pandemic, the SolarWinds Cyberattack and innumerable ransomware attacks, modern…

Manage Up to Make Virtual Assessments Succeed

In virtual assessments management and in sports, the most important determinants of success tend to reside just outside the boundaries of general awareness. Teams win…

Virtual Assessments Basics – Spring Training for TPRM

As Spring Training for Major League Baseball comes to an end and the season gets into full swing, Shared Assessments rolled out another resource…

5 TPRM Lessons Learned From The Pandemic

In the webinar “Top 5 Third Party Risk Management Lessons Learned from the Pandemic” Brad Keller, Vice President and CSO, Shared Assessments, and Brenda Ferraro, Vice…

Off-Site Assessments – The New Virtual Reality

Well, almost a year has passed, and we are really no closer to being able to conduct security control assessments on-site. So, for those of…

Financial Crime Risks: What A Vendor Manager Must Know About Sanctions and Money Laundering

Shared Assessments’ Continuous Monitoring Working Group recently convened to examine the risks from financial crime that a vendor manager must understand. Ken Wolckenhauer,…

Third Party 5G Risks & The Power of ‘And’

Sharp leaders deploy it, improv performers embrace it and fifth generation (5G) wireless technology depends on it. I’m referring to the power of “and.”…

The Nitty-Gritty on 5G Privacy

Would you rather a have crane collapse on you while strolling through a city or have your every move tracked by Big Brother?  …

Optimizing Your Third-Party Risk Management Programme Webinar Summary

Organizations that make continuous monitoring of critical vendors a part of their holistic and life-cycle based risk management program more frequently achieve business objectives.

5G Security Needs Rethinking, Quickly

As the race to implement fifth generation wireless (5G) intensifies, we should take a brief pause to address common misperceptions that could create major cybersecurity…