Discover the Winter 2024 Grid® Report for Third Party & Supplier Risk Management Software. Get insights into leading solutions like UpGuard, Secureframe, and more. Learn about features, satisfaction ratings, and market presence to make informed decisions for your risk management needs
Stay informed about the evolving landscape of cybersecurity threats stemming from third-party breaches with a comprehensive overview of recent incidents and legislative responses.
This paper examines six essential risk categories in detail to understand why they are going to be critical to manage in 2024 and how to account for these risks in your vendor relationships.
The 13 Providers That Matter Most And How They Stack Up
This white paper aims to equip organizations with the knowledge and tools to prepare for and respond to potential third-party cybersecurity incidents.
Overcoming Staffing and Compliance Challenges in Cyber Risk Management
While data breaches are commonplace, occasionally there’s an attack so audacious that its impact reverberates long after the initial jolt. Such was the case with the SolarWinds supply chain breach, in which a nation-state surreptitiously inserted eavesdropping malware into an Oklahoma software maker’s IT performance management solution used by governments and major enterprises.
A board reporting checklist for CISOs
Transform your cybersecurity strategy from reactive to proactive with the Comprehensive Guide to Cyber Ranges. Learn how high-fidelity simulated environments empower security professionals to train, test, and respond effectively to evolving threats.
The importance of reputation and resilience in cybersecurity
The data and insights in this report are based on an online survey conducted in November 2022 among 209 security and IT leaders and executives, security administrators, and compliance professionals in the U.S. from CRA’s Business Intelligence research panel. The objective of this study was to reveal organizations’ experience with cybersecurity attacks originating from third parties as well as their assessments of their supply chain visibility, and other issues related to managing third-party risk.
This guide aims to answer this question by helping InfoSec professionals understand the existing barriers to risk quantification and myths surrounding them, in addition to providing concrete steps that future-oriented InfoSec teams can take to successfully quantify risks and communicate critical risk impacts to business executives.
Understanding the Payment Card Industry Data Security Standard version 4.0.
A comprehensive checklist