Home

Third-Party Risk Education

Venminder has a team of due diligence experts who can significantly reduce your vendor management wo

Episodes

Total: 243

Vendor risk management is a necessary investment and it can have a significant ROI for your organiza

You need to be thoroughly analyzing your vendor’s SOC reports to ensure there is no missing or overl

If one of your vendors falls victim to a data breach, it can have a range of serious consequences fo

Having a strong information security policy is more important than ever with rising cybersecurity ri

In this week’s 90-second podcast, learn the top four expert tips that will help to help fintech orga

You can take specific steps that will help you maximize even the smallest budget for vendor manageme

If you have well-developed vendor contracts, then you are setting your organization up for success w

Chris Caputo, External Audit Coordinator at CMG Financial, shares his thoughts on commonly seen vend

To be successful in vendor contract management you have to be effective in your negotiation efforts.

Once you receive a vendor contract, there are specific steps that you should take for a more success

The process of conducting vendor management exams has changed drastically during the pandemic. Wheth

Jenn Wilkinson, Vice President of Strategic Vendor Management at Cenlar FSB, shares her thoughts on

By not being aware of the hazards of incomplete vendor due diligence, you could be putting your orga

Asking the right questions in your vendor information security assessment questionnaires can prevent

Understand the basics of business continuity management with this 90-second podcast that breaks down

There are important requests you need to include in all of your vendor contract negotiations. These

Handling Problem Vendors

2020/6/2

Listen this roundtable discussion to hear from three third-party risk management experts as they sha

With so many different components and responsibilities involved in third-party risk management, orga

You should be proactively taking steps to mitigate risks posed by potentially vulnerable vendors. Th

There are three key components of information security that you should monitor when analyzing your v