Latest News


  • 032422TNTPRM Core Metrics to Track and How to Track Them

    Recorded:    June 1 | 2023      Watch

    Third-party risk management (TPRM) is a crucial aspect of any organization's overall risk management strategy. With the increasing reliance on third-party vendors, contractors, and service providers, it's more important than ever to understand the risks associated with these relationships and take steps to mitigate them.

  • 051823TNData Access Governance in the Digital Age

    Recorded:    May 18 | 2023     Watch

    In today's digital world, data access governance has become a crucial aspect of protecting sensitive information. Organizations are facing increasing challenges when it comes to managing data access and ensuring the security of their critical data. Join our upcoming webinar to learn about best practices for data access governance and how Netwrix solutions can help simplify this task.

  • 032422TNA Deep-Dive into TPRM & NIST Framework Integration

    Recorded:    April 20 | 2023      Watch

    The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is one of the leading frameworks for private and public sector cybersecurity maintenance and used by organizations of all sizes. The Framework helps to secure information systems and guide key decision points about risk management activities through the various levels of an organization from senior executives, to business and process level, and operations.

  • 032422TN[Attack]tive Directory: How To Overcome Exploits and Prevent Attacks

    Recorded:    March 30 | 2023      Watch

    Active Directory controls access to critical systems and data for organizations around the world — but it is not always managed securely. That makes it a top target of attackers.

  • 032422TNThink Like a Hacker: Tactics to Identify Gaps in Your IT Security Posture

    Recorded:    March 16 | 2023      Watch

    Cybersecurity is one of the largest concerns facing businesses today and hackers continuously develop diverse ways of penetrating your cybersecurity defences. By adopting the mindset of a hacker, you can be one step ahead of malicious attacks and improve your cybersecurity infrastructure.

  • 032422TNAligning Cybersecurity Best Practices with Third-Party Risk

    Recorded:    February 16 | 2023      Watch Now

    The cyber threat landscape grows exponentially each year. Third-party cyber data breaches like the Kaseya data breach, a cyberattack that affected over 1,500 organizations, have prompted regulators to raise cybersecurity standards. In the United States, the Biden Administration aims to improve nationwide cybersecurity with an executive order. The 100-day plan aims to modernize federal infrastructure, improve supply chain security, establish a cybersecurity review board and more.

  • 032422TNNavigating the Impact of your digital footprint on Cyber Insurance Coverage

    Recorded:    January 26 | 2023      Watch Now

    The state of cybersecurity feels volatile. Despite massive worldwide spending on risk management to the tune of $150 billion, cyber attacks keep happening. Ransomware attacks doubled in 2021, with average ransomware recovery costs doubling to $1.85 million and average downtime increasing to 22 days.

  • 032422TNHow to Utilize Security Ratings in Third-Party Risk Management

    Recorded:    December 14 | 2022      Attend

    In an interconnected, ever changing digital world, how well your data is secured across your supply chain is a matter of great importance. Failing to adequately screen vendor security risks can lead to data breaches, which can shut down operations, damage customer trust and incur hefty regulatory penalties.

  • 032422TNStreamlining GRC Controls to Optimize Cybersecurity

    Recorded:    November 17 | 2022      Attend

    In today’s interconnected world of rapid data exchange, GRC Controls impact each and every part of an organization’s cybersecurity posture.

  • 032422TNData Privacy Essentials

    Recorded:    November 3 | 2022      Attend

    Data privacy is a key component in many strict regulatory mandates and a subject of increasing attention from the public at large. To avoid steep fines and attract and retain customers, organizations must ensure the privacy of all the sensitive data they process and store. But what's the best path to achieving that goal?

  • 032422TNEnriching Third-Party Risk Processes with Targeted Risk Intelligence

    Recorded:    October 20 | 2022      Attend

    With organizations having an average of over 5500 third parties in their vendor ecosystem, third-party risk management (TPRM) can be overwhelming and costly. Manual approaches to TPRM research and analysis are no longer appropriate. Targeted risk intelligence and automated data feeds can enable organizations to recognize risk sooner and respond with increased operational resilience, reducing the manual burden and cost.

  • 032422TNUnderstanding the Modern Attack Surface: IoT and Supply Chain Risk

    Recorded:    October 6 | 2022      Attend

    The corporate attack surface is rapidly expanding: how can security professionals get ahead of the curve and create resilient organizations?








Log in

Please Login to download this file

Username *
Password *
Remember Me





MetricStream TPRM



Go to top