Third-Party Risk Management
Vendor Pandemic Questionnaire for Cybersecurity (Free Template)
Use this template to evaluate business continuity and data breach risks in your supply chain in a pandemic scenario.
Read more
12 Best Third-Party Risk Management Software Solutions (2025)
Learn which contenders are the top TPRM solution options in the market. Compare their features to make the best decision based on your requirements.
Read more
Free Infrastructure Security Questionnaire Template (2025 Edition)
Use this information security questionnaire template to appraise your vendors and build out your own internal questionnaire document.
Read more
Free Kaseya Vendor Security Questionnaire Template (2024 Edition)
Refine your organization's vendor risk management toolbox by using this FREE Kaseya vendor questionnaire template.
Read more
Supply Chain Resilience: Creating an Effective Risk Management Plan
Learn all about supply chain risk management, and explore how your organization can increase resilience by building an effective risk management plan.
Read more
Free SolarWinds Vendor Questionnaire Template (2025 Edition)
Elevate your organization's vendor risk management program by utilizing this FREE SolarWinds vendor questionnaire template.
Read more
Exploring TPRM in Singapore's Personal Data Protection Act
Singapore's PDPA is a cybersecurity regulation focused on protecting personal data. Explore how it applies to Third-Party Risk Management in this blog.
Read more
Vendor Post-Data Breach Questionnaire (Free Template)
A vendor data breach is a critical cybersecurity risk. Use this template to determine your risk of being impacted by a third-party breach.
Read more
Vendor Modern Slavery Questionnaire (Free Template)
You could be unknowingly exposing your supply chain to modern slavery practices. Use this template discover these risks in your vendor network.
Read more
Introducing UpGuard's New SIG Lite Questionnaire
Streamline your data collection and vendor risk assessments with UpGuard’s SIG Lite risk-mapped questionnaire.
Read more
Vendor Offboarding: Best Practices for Ensuring Security
Learn about how your organization can prioritize security while offboarding third-party vendors.
Read more
Meeting the Third-Party Requirements of the Essential Eight
Learn about how Australia's Essential Eight cybersecurity framework can help mitigate risks involved with third-party vendors and suppliers.
Read more
Choosing an All-in-One Vendor Monitoring and Management Tool
Explore what makes a vendor monitoring and management tool successful and how it can help your organization stay secure when working with third parties.
Read more
Top 8 Whistic Competitors & Alternatives: Comparison & Review
Explore some alternatives to Whistic's third-party risk management software, including other top competitors like Bitsight, Prevalent, and more.
Read more
What is ISO 31000? An Effective Risk Management Strategy
Learn about the structure of ISO 31000 and how the standard can be used to improve your risk management strategies at an organizational level.
Read more
Evaluating & Managing Service Provider Security Risks
Partnering with managed services increases your cybersecurity risk exposure. Learn about the top risks associated with managed service providers.
Read more
Sign up for our newsletter
UpGuard's monthly newsletter cuts through the noise and brings you what matters most: our breaking research, in-depth analysis of emerging threats, and actionable strategic insights.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities
