News

Best Practices Vendor Risk Management for Law Firms: 7 Steps to Success Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a ...
A straightforward vendor management process forms the backbone of any strong third-party program. It includes identifying vendor needs, selecting the right partners, negotiating agreements, and ...
The vendor risk assessment process 1. Take inventory. The first step is to take inventory of all of the vendors to make sure each and every one is accounted for.
Vendor onboarding is the process of establishing a company as an approved provider of technology, goods, or services to your organization. It’s also an essential early step in the vendor risk ...
2. Security Measures. Attorneys should evaluate the overall health of the vendor's security programs and procedures. This process can include determining whether the vendor backs up its data ...
If you’re just beginning to implement a vendor risk management (VRM) program, BitSight Technologies has identified 10 frequently asked questions to help you get started. Implementing a VRM Program ...
Third Party Risk Management (TPRM) programs are critical in today’s business environment where companies increasingly rely on external vendors for essential services. A robust TPRM program aims ...
Incidents can still occur no matter how robust your vendor management process is. As such, it’s crucial to have a vendor incident response plan outlining the steps your company will take if a ...
When you are assessing risk for your organization, please resist the urge to say, "If we get breached because of a vendor, it wouldn't be our fault. We don't need to worry about it." ...