Provided by  Onspring2019-12-02T12:22:00
Onspring2019-12-02T12:22:00
 
      This e-book by Onspring lays out practical steps to develop the strategies needed to manage the risk hiding in third-party vendor relationships. Holding vendors to high standards for security, personnel management and regulatory compliance is a challenge; knowing how to do it can ease the stress of dealing with potential risk.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
 
                
                2025-10-30T19:39:00Z By Neil Hodge
Companies could face significant compliance challenges in trying to meet new EU legal requirements about how companies share data with third parties.
 
                
                2025-10-29T20:12:00Z By Tom Fox
As CFOs use AI to streamline operations, they face new compliance risks tied to accountability and algorithmic governance. CCOs must work with them to ensure transparency and oversight throughout adoption.
 
                
                2025-10-22T18:22:00Z By Adrianne Appel
The New York State Department of Financial Services (NYDFS) wants financial firms to step up their game when it comes to third parties and cybersecurity.
 
                
                2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
 
                
                2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
 
                
                2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud
 
             
