News & Analysis as of

Risk Management Third-Party Service Provider Third-Party Risk

WilmerHale

FINRA’s 2025 Annual Regulatory Oversight Report: Focus on AI, Other Emerging Risk Areas, and Best Practices

WilmerHale on

On January 28, 2025, FINRA published its Annual Regulatory Oversight Report (the Report). The Report highlights emerging risk areas and recent developments, common compliance deficiencies, and best practices for member firms....more

Benesch

Key Considerations in Developing a Comprehensive AI Governance Policy and Mitigating Risks of AI Use

Benesch on

Crafting an AI Governance policy best suited for your business requires careful consideration of the types of AI, how AI will be used, current and future legislation, and a group of individuals specifically designated to...more

Benesch

Navigating Legal Liability in AI Adoption: What Healthcare Executives Need to Know

Benesch on

The adoption of artificial intelligence (AI) in healthcare has ushered in a new era of innovation that is transforming diagnostics, treatment planning and operational efficiencies. However, with great potential comes...more

Troutman Pepper Locke

6 Tips for Cos. Facing Service Provider Cyber Incidents

Troutman Pepper Locke on

It is no secret that ransomware dominates headlines, and cybersecurity incidents have become part of our everyday language. However, the criminal “business model” behind ransomware keeps evolving. Originally published in...more

Baker Donelson

Best Practices for Protecting Operations from Vendor's Cyber Incidents

Baker Donelson on

In the aftermath of a vendor's hack that crippled an industry, ensure your business is up to date on best practices for mitigating the risks of third-party cyber incidents. Many businesses struggle to adequately consider the...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 14th, 9:00 am BST

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

NAVEX

[Webinar] Trust Beyond Boundaries: Holistic Approaches to Third-Party Risk - September 13th, 9:00 am PT

NAVEX on

Third-party relationships supporting core operations are now more important than ever for most organizations. Yet too often, procurement, information security, compliance, and other professionals are overburdened with the...more

McDermott Will & Emery

[Webinar] PCI DSS 4.0: Third-Party Service Providers and Risk Management - June 7th, 12:00 pm - 1:00 pm EDT

McDermott Will & Emery on

Join members of McDermott’s Global Privacy & Cybersecurity team and Alan Gutierrez-Arana of Mazars for the next installment in our PCI DSS 4.0 series. PCI DSS 4.0 brings major changes to payments with an increased focus on...more

Mitratech Holdings, Inc

What is a Vendor Risk Assessment?

We recently dove into what vendor risk and vendor risk management entails. Once you understand that this is the risk that results from vendors, it’s simple to extend this and establish that vendor risk assessment (VRA), or...more

Mitratech Holdings, Inc

What is Vendor Risk & Vendor Risk Management (VRM)?

Vendor risk management (VRM), or third-party risk management, is the management, monitoring, and evaluation of risks that result from third-party vendors and suppliers of products and services. It’s a crucial initiative...more

Mitratech Holdings, Inc

The Case for Decentralized Third-Party Risk Management

As we now enter the third quarter of our discontent with the Coronavirus worldwide pandemic, one thing is very clear: Centralized vendor risk management is imploding....more

Reveal

The eDiscovery Impostor and How to Spot Them

Reveal on

“To err is human,” but in an industry as seemingly driven by precision as eDiscovery, errors are all too common. Yes, mistakes are going to happen. Which is why we can fall back on processes and procedures to ensure that even...more

Thomas Fox - Compliance Evangelist

The Dutch Tulip Bubble and Internal Controls for Third Parties

Internal controls are a key tool to operationalize your third-party risk management program. The basic internal controls, that should be a part of any financial controls system. There were four significant controls the...more

Foodman CPAs & Advisors

When Bank Account Activity is not Consistent with the Customer’s Business

According to the Bank Secrecy Act (BSA), the Financial Crimes Enforcement Network (FinCEN) states that the main focus for Financial Institution ought to be on the reporting of suspicious activities....more

NAVEX

Third-Party Risk Programs Should Focus on Offense, not Defense

NAVEX on

Just 43 percent of organizations surveyed in NAVEX Global’s 2016 Ethics & Compliance Third Party Risk Management Report said they evaluated third parties before engaging with them—down from 68 percent in 2015....more

NAVEX

If Things Have to Be Risky for Your Third-Party Risk Management Program to be Valuable, You’re Doing It Wrong.

NAVEX on

Seventy-five percent of respondents in the 2016 Ethics & Compliance Third Party Risk Management Benchmark Report rejected at least one third party as a business partner last year because of high risk factors identified in due...more

The Volkov Law Group

Third-Party Risk Management – Part 1: Contract Extension

The Volkov Law Group on

Risk Management is a constant theme for top management as it might make the difference between a successful move and failure. It implies identification, assessment and prioritization of risks....more

King & Spalding

Unprecedented Hacking and Trading Scheme Highlights Key Cybersecurity Lessons

King & Spalding on

On Aug. 11, 2015, federal prosecutors in the District of New Jersey and the Eastern District of New York unsealed indictments against nine individuals in the U.S. and Ukraine who were allegedly involved in a five-year,...more

Williams Mullen

Managing Risks in Vendor Relationships

Williams Mullen on

For years, banks have relied on third party vendors to provide specialized products or services, or have used outsourcing as a way to reduce internal operating costs. In the wake of the financial crisis, however, regulators...more

19 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide