Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

third party risk

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Schneider Electric     Published Date: Jun 07, 2019
New digital technology now makes it feasible to integrate process control and SIF within a common automation infrastructure. While this can provide productivity and asset management benefits, if not done correctly, it can also compromise the safety and security of an industrial operation. Cybersecurity and sabotage vulnerability further accentuate the need for securing the safety instrumented system (SIS). Certainly, a common platform approach using similar hardware and software dedicated for control and safety functions, respectively, can provide the potential for cost savings. However, it is widely acknowledged that utilizing separate, independent, and diverse hardware/software for safety and control is the optimal way to protect against potentially catastrophic common cause and systematic design and application errors. Different vendors offer varied degrees of integration and solutions. The question is: how to provide an integrated control and safety solution with advanced functionality and productivity without compromising safety and security? And, where do users draw the line? A third-party (e.g., TÜV) certification of the hardware/software systems to IEC 61508 specifications carries significant advantages, but should this be the only criterion? How does a third-party certificate extend to the plant’s overall assignment of risk reduction credits for all independent protection layers (IPL)? Control system embedded safety logic solvers may actually increase the SIL requirements of the SIF if no credit is allowed for the distributed control system (DCS) as an IPL. Download the white paper to learn more.
Tags : 
smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, operational profitability, ecostruxure plant, process automation, profitable safety, defence in depth, industrial automation, process control, process systems
    
Schneider Electric
Published By: Recorded Future     Published Date: Apr 18, 2019
Enterprises increasingly operate in a digitally interconnected world where third parties like suppliers, customers, channel partners, and others are often directly connected to their internal IT systems, and where their underlying IT infrastructure may be owned and managed by an outside organization. These business relationships can knowingly or unknowingly introduce different types of risks that need to be identified and managed as if these third parties were part of the enterprise itself. Recorded Future's latest risk intelligence offering enables threat intelligence teams to better understand, monitor, and measure their real-time exposure to these third-party risks. Armed with this information, organizations can better assess and prioritize risk mitigation actions.
Tags : 
    
Recorded Future
Published By: Recorded Future     Published Date: Apr 18, 2019
A very high level look into managing third-party risk in infographic format
Tags : 
    
Recorded Future
Published By: CA Technologies EMEA     Published Date: Sep 14, 2018
Data security risk caused by third parties is a pervasive problem. Yet, many organizations granting remote privileged access to third-party users leave gaps that represent significant security risks. If you’re like most organizations today, you frequently grant vendors, contractors and other non-staff members access to internal networks and systems. These privileged users remotely administer your operating systems, databases or applications using their own endpoint devices. Download the eBook to learn the five best practices to control security risk brought on by third parties.
Tags : 
    
CA Technologies EMEA
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn everything you need to know about effectively managing your third party risk-from defining a due diligence process to creating risk-based strategy-in our comprehensive guide. What you'll learn: -How to define your goals and create a strategy -How to manage your third-party risk management programme -How to track and improve your programme's effectiveness
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Apr 20, 2018
An effective third-party risk management programme is in the interest of all organisations—regardless of size, industry, and number of third party providers. This report will help you benchmark your third-party risk management programme and its performance against trends in the market and best practices. What you'll learn: The top issues and challenges organisations are facing with their third-party risk management programmes How organisations are using outside providers to help with third party due diligence The inconsistency of top concerns year over year and what this might indicate How to leverage the findings in this benchmark report to increase programme effectiveness in your own organisation
Tags : 
    
NAVEX Global
Published By: FICO     Published Date: Apr 07, 2018
Cybersecurity is on everyone’s mind – but why should you care about the cybersecurity of the businesses you work with? Download our infographic and discover: When you need to assess the cyber risk of another organization. The implications of not understanding the cybersecurity posture of the businesses you work with.. How measuring third-party cybersecurity risk will help you.
Tags : 
    
FICO
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
Knowing which steps to take to ensure your organisation remains vigilant against bribery and corruption is an important move. When your organisation is aligned on anti-bribery and corruption policy, training and third party risk, your employees can identify, report and ultimately stamp out—bribery and corruption. Our Solutions Experts can help you strengthen your most challenging ABC issues and better protect your organisation. Contact us to set up a consultation today at info@navexglobal.com.
Tags : 
anti-bribery programme, anti-bribery and corruption, corruption risk assessment, anti-bribery checklist, preventing anti-bribery, corruption assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 22, 2017
An effective third-party risk management programme is in your best interest. Not only can you more confidently engage with a growing network of vendors, suppliers, resellers and distributors; but when done effectively, you can have a positive impact on the effectiveness and efficiency of your broad ethics and compliance programme. NAVEX Global research has shown that organisations pursue strong ethics and compliance programmes for myriad reasons, but at the top is a desire to cultivate and maintain a culture of ethics and respect. A strong third-party risk management solution helps organisations realise that objective through engaging with third parties that abide by codes of conduct, that are transparent and communicative and that you can be proud to do business with.
Tags : 
third party risk management, third party risk, managing third parties, risk management, anti-bribery programme, compliance programme
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
The Definitive Guide to Third-Party Risk Management is a comprehensive resource full of insight, advice and examples to help organisations identify and address their third-party risk. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with third party business partners. It will also protect your organisation from the risks that third parties can present. This guide is divided into three main sections: PLAN, IMPLEMENT and MEASURE. In these sections you’ll find the information and tools you need to develop a risk-based strategy, define third-party risk and a standard due diligence process, implement continuous monitoring of third parties and identify areas in which you need to improve your programme’s effectiveness.
Tags : 
risk management, third – party risk, navex, safeguard, risk – based strategy
    
NAVEX Global
Published By: NAVEX Global     Published Date: Dec 07, 2017
With the introduction of the Foreign Corrupt Practices Act (FCPA) and UK Bribery Act, organisations must take corruption in business seriously. Given the complexity of the activities addressed in an anti-bribery and corruption programme, however, the task can seem overwhelming. Our Anti-Bribery and Corruption Risk Assessment Checklist outlines how to implement an effective anti-bribery compliance programme using a protect, detect and correct methodology to manage core programme components such as: • Policies • Risk Assessment • Corrective Action • Training / Communication • Culture • Controls / Oversight • Business Partners Our checklist will enable you to design and implement an effective, global and consistent anti-bribery compliance programme.
Tags : 
foreign corrupt practices act (fcpa), uk bribery act, risk management, third – party risk
    
NAVEX Global
Published By: Determine (Selectica)     Published Date: Oct 24, 2017
Organizations today and for the foreseeable future must have visibility into supplier and third-party operations in order to mitigate risks and achieve compliance.
Tags : 
    
Determine (Selectica)
Published By: UPS     Published Date: Sep 01, 2017
Growth in new markets introduces new costs to control, regulations to manage, and supply chain complexities to solve. Longer, more complicated cold chains mean that collaboration with third party logistics providers (3PLs) can help make the difference between profitable simplicity and unmanageable complexity. Companies are increasingly relying on their 3PLs for services such as monitoring and intervention, contingency planning, and cost control. Reduce risk by improving packaging, visibility, and establishing QA best practices. Improved visibility, new tools, new monitoring capabilities and appropriate packaging can also help drive down costs for shippers.
Tags : 
healthcare, cold chain, efficiency, ups, practices
    
UPS
Published By: CA Technologies     Published Date: Aug 22, 2017
OAuth is an emerging Web standard for authorizing limited access to applications and data. It is designed so that users can grant restricted access to resources they own—such as pictures residing on a site like Flickr or SmugMug—to a third-party client like a photo printing site. In the past, it was common to ask the user to share their username and password with the client, a deceptively simple request masking unacceptable security risk. In contrast to this, OAuth promotes a least privilege model, allowing a user to grant limited access to their applications and data by issuing a token with limited capability.
Tags : 
    
CA Technologies
Published By: NAVEX Global     Published Date: Jul 17, 2017
Establishing a culture of integrity, ethics and respect is the number one priority for companies in 2017, according to a new report. In common with the 2015 report, getting an organisation's culture right is the main objective for compliance professionals in the year ahead, with 85 per cent of respondents saying it is one of their three main goals. However despite this, only 32 per cent of firms indicated that they are planning to undertake a culture or ethics assessment in the next twelve months. In addition, workplace behaviour was rated as the lowest area of risk receiving attention by stakeholders (29 per cent). Download the full report for additional stats on board level reporting, increasing compliance programme awareness and satisfaction with third party risk management.
Tags : 
measuring programme effectiveness, insufficient staff, managing regulations, lack of tools, budget issues, programme reporting
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Screening your third party vendors and business partners for risk can be a challenging process. With so many different factors to consider, where do you even begin? We've developed our Anti-Bribery and Corruption Risk Assessment Checklist so you can streamline your compliance risk assessment processes and ensure each potential risk is addressed. Keep up with changing European laws and regulations with this checklist.
Tags : 
training, communication, culture, controls, oversight, policies, risk assessment
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 17, 2017
Thirty percent of organisations expect to do more work through outside third parties in 2017. However, third parties are responsible for 75 percent of foreign bribery schemes, making these engagements rife with risks that can’t be ignored. A strong third-party risk management programme will help your organisation make smart choices when it comes to engaging with outside business partners. The Definitive Guide to Third-Party Risk Management gives you insight, advice and examples to help your organisation recognise and address third-party risk.
Tags : 
assessments, workflow, overseer, documentation, organisation, writing, review, feedback, updates, security
    
NAVEX Global
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, it’s becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
    
Determine (Selectica)
Published By: Lenovo and Intel®     Published Date: Apr 28, 2017
The stats, risks, and tactics you need to shape your mobile strategy are in this definitive guide! We’ve compiled all the stats you need from first- and third-party surveys. We’ve identified the key risks. And, we’ve outlined the tactics you can put in place. With this definitive guide, you will have everything you need to shape a mobile strategy that succeeds. Get this guide now.
Tags : 
lenovo, mobile organization, mobile strategy, mobile ecosystem, security, flexibility, connectivity, durability, mobile workforce, anatomy of mobile organization
    
Lenovo and Intel®
Published By: Secureworks     Published Date: Nov 11, 2016
To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.
Tags : 
managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security
    
Secureworks
Published By: NAVEX Global     Published Date: Oct 18, 2016
This report aims to help you identify the compliance program you have in place, how to document your program elements and finally, develop and implement a work plan for addressing gaps.
Tags : 
    
NAVEX Global
Published By: Flexera     Published Date: Sep 16, 2016
Download this white paper to learn more about these three steps to securing software patches: Play to strengths and know your weaknesses Prioritize for Bottom Line Value Design a Process to Support Desired Outcomes
Tags : 
software patch, patch management, third-party patching, software vulnerability management, vulnerability intelligence, enterprise risk, flexera, risk reduction
    
Flexera
Published By: BitSight Technologies     Published Date: Mar 02, 2016
Cybersecurity in the financial services industry is rapidly evolving. Do you know how to stay ahead of the curve? The financial sector has been a pioneer for vendor risk management (VRM) best practices for a long time. Yes cybersecurity practices are continuing to evolve, and regulatory bodies are focusing more on third-party risk. Are you prepared for these changes? We'll dive further into this topic in this white paper and exploe: - How the threat landscape has been changing - and what can you do about it. - Some challenges the financial industries face in taking on VRM. - Four proactive tips for better VRM practices that you can put into place today. Download this free white paper now to better understand the changes to cybersecurity in the financial industry and what you can do about it.
Tags : 
bitsight, risk management, cybersecurity, vrm practices, vendor risk management, financial sector, it management, enterprise applications
    
BitSight Technologies
Previous   1 2    Next    
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.