• Shared Assessments Standard Information Gathering Template (SIG) Question Library Content

    The Shared Assessments Program has been setting the standard in third party risk management since 2005, when the Big Four and six global banks collaborated to form Shared Assessments to address the inefficiencies surr...
    Corey Carpenter
    last modified by Christine Tran
  • Tenable.sc Vulnerability Management Integration

    As the creator of Nessus®, Tenable extended its expertise in vulnerabilities to deliver Tenable.io®, the world’s first platform to see and secure any digital asset on any computing platform. Tenable.sc...
    Susan Read-Miller
    last modified by Christine Tran
  • Archer Scripts Timesheet App-Pack

    The Archer Scripts Timesheet App-Pack enables RSA Archer users to enter time in a weekly view and store hours by day for projects stored in any application within RSA Archer. Not only can users pick pro...
    Gloria Higley
    last modified by Susan Read-Miller
  • ComplyTec NERC Compliance Management App-Pack

    For over two decades, ComplyTec Inc. has provided Governance Risk and Compliance (GRC) or Integrated Risk Management (IRM) solutions to the utility industry.  ComplyTec is a strategic partner ...
    Christine Tran
    last modified by Susan Read-Miller
  • California Consumer Privacy Act Authoritative Source Content

    The California Consumer Privacy Act was passed in 2018 and goes into effect on January 1, 2020.  This bill grants consumers the right to request businesses disclose the categories and specific pieces of personal ...
    Susan Read-Miller
    last modified by Christine Tran
  • Venminder Third Party Risk Management Integration

      Venminder is a provider of third party risk management solutions providing online software technology that can guide and streamline third party risk management programs as well as the ability to save valuable ...
    Susan Read-Miller
    last modified by Christine Tran
  • Crowe Pandemic Response App-Pack

      Crowe LLP is a public accounting, consulting and technology firm with offices around the world. Crowe uses its deep industry expertise to provide audit services to public and private entities. The firm and its...
    Christine Tran
    last modified by Susan Read-Miller
  • NTT ISMS Risk Assessment App-Pack

    Designing the right processes, organization, and templates during the initial setup of an Information Security Management System (ISMS) are challenges organizations face. Rolling out ISMS in a big organization require...
    Gloria Higley
    last modified by Susan Read-Miller
  • RSA Archer IIC-Aligned IoT Security Maturity Assessment App-Pack

      With the increase of usage for IoT devices comes an increase in risk and vulnerabilities. Organizations face issues with prioritization of risk and vulnerabilities due to constraints with security resources. F...
    Christine Tran
    last modified by Susan Read-Miller
  • AWS Security Hub Integration

      AWS Security Hub provides security alerts and compliance information related to Amazon Web Service accounts, services, and supported third-party partner products. It aggregates, organizes, and prioritizes...
    Christine Tran
    last modified by Susan Read-Miller
  • Qualys Vulnerability Management Integration

    Qualys is a pioneer and leading provider of cloud-based security and compliance solutions. Qualys Vulnerability Management is a cloud-based service that provides immediate, global visibility into where your IT systems...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • RiskRecon Own Enterprise Monitoring Integration

    RiskRecon enables you to control third-party risk by providing vendor security assessments that are comprehensive, actionable and available on demand. We can evaluate the security program of any organization -- SaaS, ...
    Christine Tran
    last modified by Susan Read-Miller
  • RiskRecon Third Party Security Risk Monitoring Integration

      RiskRecon enables you to control third-party risk by providing vendor security assessments that are comprehensive, actionable and available on demand. We can evaluate the security program of any organization -...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • SecurityScorecard Integration

    SecurityScorecard provides an exclusive security rating platform able to determine the security risk of any organization on the Internet. The company's proprietary SaaS offering helps enterprises gain operational comm...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Supply Wisdom Integration

      Supply Wisdom was launched out of a need for an early warning service to help enterprises detect and prevent disruptions across both third parties and locations. Today, global industry leaders use Supply Wisdo...
    Dan Abrahamson
    last modified by Susan Read-Miller
  • Thomson Reuters Regulatory Intelligence Integration

    Thomson Reuters Regulatory Intelligence includes global coverage of over 750 regulatory bodies and more than 2,500 collections of regulatory and legislative materials. It is powered by news, analysis, and practical gu...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Wolters Kluwer NILS™ INsource® Integration

    Wolters Kluwer is a global provider of actionable regulatory content designed to work to support regulatory change management initiatives. Wolters Kluwer has over 400 in house experts (former regulators, compliance at...
    Christine Tran
    last modified by Susan Read-Miller
  • American Institute of CPAs (AICPA) Privacy Maturity Model Authoritative Source Content

    The American Institute of CPAs (AICPA) provides the world’s largest member association representing the accounting profession. The organization includes 431,000+ members in 130 countries and territories, re...
    Susan Read-Miller
    last modified by Susan Read-Miller
  • Cybersecurity Maturity Model Certification Framework (CMMC) Authoritative Source Content

    The Office of the Under Secretary of Defense for Acquisition and Sustainment (OUSD(A&S)) has developed the Cybersecurity Maturity Model Certification (CMMC) framework in concert with U.S. Department of Defense (Do...
    Gloria Higley
    last modified by Susan Read-Miller
  • European Union (E.U.) Regulatory Technical Standards for Authentication Authoritative Source Content

    The Regulatory Technical Standards on strong customer authentication and secure communication are key to achieving the objective of the revised Payment Services Directive (PSD2) for enhancing consumer protection, prom...
    Gloria Higley
    last modified by Susan Read-Miller