Automate & Educate at Scale
The increasing exposure of software supply chain vulnerabilities through cyberattacks has brought renewed focus on third-party risk management programs, as well as the tools used to oversee them. …
5 Steps to Effective Vendor Risk Management
The term ‘Vendor risk” covers all aspects of threats to your organisation and your customers posed by an outsourced relationship with a vendor and the products or services they provide. …
Why being compliant isn’t the same as being secure
In the world of cybersecurity, two terms that are often used interchangeably are “security” and “compliance.” However, they are not the same thing. As cyber threats increasingly become a business-critical issue for all organisations, it is time for organisations to step up from simply being …
How much do you really know about your extended enterprise?
Information risk is something that businesses everywhere are having to face, and with risk comes responsibility. All organisations now generate, process and store vast amounts of information to maximise the returns from their investments. But, who is responsible for defining an acceptable level of risk …
Cyber Security, is it a core part of your ESG?
With the costs of a data breach rising by 10% between 2020-2021, the global average cost to a business now sits at a huge £3.93 million. With these figures focussing board attention and the news of data breaches hitting the media every day, it’s no …
Understanding Regulation of Critical Third Parties
All companies in Financial Services are subject to Financial Conduct Authority (FCA) regulations and Prudential Regulation Authority (PRA) regulations, on assessment of third-party risk. …