Third-Party Risk Management
Integrating ESG Into a TPRM Program: Mitigating Operational Risk
Learn more about ESG and how to implement the framework into your existing third-party risk management program.
3 Best Third-Party Risk Management Software Solutions in 2023
Learn which contenders are the top TPRM solution options in the market. Compare their features to make the best decision based on your requirements.
Free Template: Vendor Pandemic Questionnaire for Cybersecurity
Use this template to evaluate business continuity and data breach risks in your supply chain in a pandemic scenario.
Free Kaseya Vendor Security Questionnaire Template (2024 Edition)
Refine your organization's vendor risk management toolbox by using this FREE Kaseya vendor questionnaire template.
Free Infrastructure Security Questionnaire Template (2024 Edition)
Use this information security questionnaire template to appraise your vendors and build out your own internal questionnaire document.
Supply Chain Resilience: Creating an Effective Risk Management Plan
Learn all about supply chain risk management, and explore how your organization can increase resilience by building an effective risk management plan.
Free SolarWinds Vendor Questionnaire Template (2024 Edition)
Elevate your organization's vendor risk management program by utilizing this FREE SolarWinds vendor questionnaire template.
Free Template: Vendor Modern Slavery Questionnaire (2023)
You could be unknowingly exposing your supply chain to modern slavery practices. Use this template discover these risks in your vendor network.
Free Template: Vendor Post-Data Breach Questionnaire (2023)
A vendor data breach is a critical cybersecurity risk. Use this template to determine your risk of being impacted by a third-party breach.
Exploring TPRM in Singapore's Personal Data Protection Act
Singapore's PDPA is a cybersecurity regulation focused on protecting personal data. Explore how it applies to Third-Party Risk Management in this blog.
Introducing UpGuard's New SIG Lite Questionnaire
Streamline your data collection and vendor risk assessments with UpGuard’s SIG Lite risk-mapped questionnaire.
Vendor Offboarding: Best Practices for Ensuring Security
Learn about how your organization can prioritize security while offboarding third-party vendors.
Meeting the Third-Party Requirements of the Essential Eight
Learn about how Australia's Essential Eight cybersecurity framework can help mitigate risks involved with third-party vendors and suppliers.
Choosing an All-in-One Vendor Monitoring and Management Tool
Explore what makes a vendor monitoring and management tool successful and how it can help your organization stay secure when working with third parties.
Top 8 Whistic Competitors & Alternatives: Comparison & Review
Explore some alternatives to Whistic's third-party risk management software, including other top competitors like Bitsight, Prevalent, and more.
What is ISO 31000? An Effective Risk Management Strategy
Learn about the structure of ISO 31000 and how the standard can be used to improve your risk management strategies at an organizational level.
Sign up to our newsletter
Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities