Third-party risk management (TPRM) isn’t a new concept, however, recent events have brought the discipline into the forefront like never before. Organizations in all industries rely on third parties, whether they be cloud service providers, suppliers, contractors, and other vendors.
Gartner scored Okta as the highest scoring vendor across all three major use cases in their report “Critical Capabilities for Access Management (October 2019).*”
Understand how the future of operational excellence will be shaped by the pandemic. Includes three big operational shifts and how your team can prepare.
Consumer-facing enterprises have long been stewards of customer identity data, storing sensitive attributes ranging from a customer’s name, to credit card numbers and home addresses.
Learn how Western Union’s Privacy team has deployed Onspring, an intelligent automation and reporting platform, to manage restricted data access, workflow and data mining.
At Okta, we run compliance differently. Most organizations place compliance under either the legal or finance team, who don’t work with their security team to ensure those controls are implemented effectively. At Okta, we use security to drive compliance.
How to rethink your policies, processes, and plans to mitigate cyber risk in an increasingly remote workforce.
In this white paper, we take a closer look at corporate-associated residential IP addresses (WFH-RO IPs) and discover attributes that pose uniquecybersecurity risks as compared to in-office corporate networks.
This document provides an introduction to Okta’s approach to managing security throughout the following chapters:
Cybersecurity risk ratings are rapidly becoming a critical component of third-party cyber risk management programs. Security leaders are beginning to use them to find quantitative data to scrutinize the statements made about security by their third parties, supporting business critical commercial discussions and risk decisions. Increasingly, security leaders are seeking to operationalize this data to build more robust information from which they can base their risk management decisions upon.
Maintaining strong vendor relationships is critical in today’s highly connected and globalized market. But for some organizations, supply chains have become ungovernably large, and the challenges facing procurement and risk management teams are only growing.
Do enterprise risks keep CEOs awake at night? According to the 100 CEOs who participated in LogicGate’s inaugural Enterprise Risk Management survey, the answer is an emphatic—if slightly groggy—YES.
This is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party security risk.
While third-party relationships undoubtedly add business value, they also introduce significant new risk and compliance challenges for organizations. On top of that, as vendor ecosystems grow in size and complexity, risk management teams are increasingly struggling to procure and maintain high-quality, real-time external data to feed their governance, risk, and compliance (GRC) technology.