top of page

   Corporate Governance (Third-Party Risk Management – TPRM – Software)

 

  • Third-party risk management (TPRM) software platforms are used to collect and manage outsourced third-party provider risk data for the enterprise, to proactively protect companies from data, noncompliance and security issues relating to any such outsourced third-party provider that might cause risk to the enterprise.

  • At a minimum, TPRM software platforms should provide: alerts; artificial intelligence (AI); automated security questionnaires; business continuity planning; catalog of all cybersecurity risks for third-party providers; certificate of insurance (COI) integration; contingency playbook; continuous monitoring of all third-party providers to the enterprise; customer lifecycle intelligence (CLI); customizable questionnaires; cybersecurity rating; data archiving; data breach detection; data leak detection; data privacy; data security; digital footprinting; digital forensics; disaster recovery planning; financial due diligence; fourth-party discovery; inventory of all third-party relationships; mapping internal controls and corporate policies to specific functions of the enterprise supple chain; monitoring third-party compliance with internal enterprise corporate policies; external risk assessments; incident response; integrated risk management (IRM); internal risk assessments; machine learning (ML); notifications to customers about how their security rating may be impacted by external risk events; questionnaire library; regulatory change management analytics; remediation workflows; reporting; risk analytics; risk maturity model (RMM); risk modeling; risk remediation plans; risk strategies; rule-based third-party risk management framework; scalability; security posture assessments; security ratings; self-service third-party portal; third-party lifecycle management; third-party monitoring; third-party risk activities; third-party risk management; third-party scorecard templates; threat intelligence; threat modeling; workflow templates.

  • Procurement, recommendation, research, sourcing, specification, testing and use of various TPRM software platforms, such as: Acuity Risk Management; Aravo TPRM; BitSight Security Ratings and TPRM; Black Kite Cyber Risk Rating System; Coupa TPRM; Deloitte TPRM; Diligent HighBond; Dow Jones Risk & Compliance; FullCircl; Fusion Framework System; Galvanize ThirdPartyBond; IHS Markit; Intelex EHSQ; Ivalua; LexisNexis Dossier Suite; LogicGate Risk Cloud; LogicManager TPRM; MetricStream TPRM; myCOI; NAVEX Global Lockpath; Ncontracts; OneTrust Vendorpedia; Onspring; Ostendio; Panorays; Predict360; Prevalent TPRM; ProcessBolt; ProcessUnity; Quantivate; Refinitive; Riskpro TPRM; RiskWatch; RSA Archer Insight; SAI Global SAI360; Secureframe; SecurityScorecard; SecurityStudio; SignalX; StandardFusion; Strike Graph; SureCloud; Thomson Reuters CLEAR; Trace International; Thomson Reuters CLEAR; TrustMAPP; Tugboat Logic; UpGuard; Venminder; Whistic.

 

   Progress_Page_Last_Updated_221105_1536

bottom of page