Third-Party Risk Management
Reducing the Impact of Third-Party Breaches (8 Strategies)
Third-party breaches and supply chain attacks are on the rise. But with these 6 strategies, you can significantly reduce their impact on your business.
Read more
Making the Vendor Questionnaire Process More Efficient
Tired of sluggish processes delayed suppressing your vendor questionnaire efficiency? Learn how to optimize them in this 4-part framework.
Read more
Meeting the Third-Party Risk Requirements of HIPAA
Learn how to align your cybersecurity program to meet the third-party risk requirements in the HIPAA regulation.
Read more
Meeting the 3rd-Party Risk Requirements of The NY SHIELD Act
Learn how to meet all of the third-party risk management expectations stipulated in the NY SHIELD Act.
Read more
Meeting the Third-Party Risk Requirements of the CCPA
Learn how to comply with the third-party risk requirements of the CCPA.
Read more
How to Make Vendors Respond to Risk Assessments (Faster)
Learn how to encourage your vendors to complete your risk assessments much faster.
Read more
Meeting the Third-Party Risk Requirements of the GDPR
Learn how to comply with the third-party risk management requirements of the GDPR
Read more
Meeting the Third-Party Risk Requirements of 23 NY CRR
Learn how to comply with the third-party risk management requirements of the new york cybersecurity legislation.
Read more
How to Calculate Risk Appetite for Third-Party Risk Management
Learn how to accurately calculate a risk appetite for your Third-Party Risk Management program (TPRM) in 2023.
Read more
How to Implement TPRM into your Existing Security Framework
Your TPRM should integrate with your existing cybersecurity framework. Learn how to efficiently evolve your cybersecurity program to include TPRM.
Read more
How to Create an Incident Response Plan (Detailed Guide)
A well-written Incident Cybersecurity Response Plan could be the difference between a minor incident. Learn how to create one in 2022.
Read more
Meeting the Third-Party Risk Requirements of NIST CSF in 2024
Learn how to comply with the supply chain risk management security requirements of NIST CSF 2.0
Read more
Meeting the Third-Party Risk Requirements of PCI DSS in 2024
Learn which PCI requirements are relevant to the third-party risk management process and how the UpGuard platform can help comply with each requirement.
Read more
How to Answer a Security Questionnaire: A 4-Step Guide
Learn best practices on how to answer a security questionnaire as a vendor.
Read more
Top 3 Vendor Risk Assessment Frustrations - Can You Relate?
Can you relate to these common vendor risk assessment frustrations? Learn how to finally address them.
Read more
Top 4 Features of Supply Chain Management Tools in 2024
Learn about the different categories of supply chain management that need to be addressed when during digital transformation
Read more
Sign up for our newsletter
Stay up-to-date on everything UpGuard with our monthly newsletter, full of product updates, company highlights, free cybersecurity resources, and more.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities