- Chief Compliance Officer and VP of Legal Affairs, Arrow Electronics
Provided by Prevalent2020-01-02T07:49:00
Prevalent has developed a new guide that summarizes the 6 key best practices of third-party risk. This paper delivers tips on key capabilities to seek and pitfalls to avoid, while providing practical advice from risk management leaders who have successfully navigated the path to TPRM program maturity.
Our white papers are prepared by our sponsors and are free to view.
You need to register for this site and agree to the sponsor’s conditions to be granted access.
2025-03-28T18:45:00Z By Aaron Nicodemus
The Securities and Exchange Commission’s Republican leadership is abandoning the climate-related disclosure rule package passed last year by Democrats, hoping that the courts will kill regulations already on life support.
2025-03-28T14:22:00Z By Thomas Graham, CW guest columnist
Many small organizations within the Defense Industrial Base are struggling to meet the rigorous requirements validated through the Cybersecurity Maturity Model Certification, writes Thomas Graham, CISO at Redspin. If you haven’t been tracking it closely, CMMC was finalized in October, with an effective date of December 16, 2024.
2025-03-27T12:49:00Z By Aaron Nicodemus
Yet another government contractor has been slapped with a fine by the Department of Justice for applying lax cybersecurity defenses on sensitive government data.
2024-11-06T17:05:00Z Provided by ServiceNow
The individual requirements for your security and risk operations are increasingly complex—and interconnected. Yet despite this increased interconnectivity, many organizations still manage their security operations (SecOps) and integrated risk management (IRM) functions in silos.
2024-08-07T05:54:00Z Provided by Theta Lake
The message from the regulators is clear - having an off-channel policy for mobile communications is not good enough.
2024-05-05T17:30:00Z Provided by ServiceNow and KPMG
To help investors gain a better understanding of cyber risk, the US Securities and Exchange Commission (SEC) has created sweeping new rules—forcing companies to take a more proactive approach to cybersecurity.
Site powered by Webvision Cloud