Resources

TPRM Academy

TPRM introduction (2)

TPRM - How to approach a Third-Party Risk Management project?

TPRM (Third-Party Risk Management) is part of a proactive approach to monitoring and controlling risks associated with supplier failure. In a context where companies and government agencies rely heavily on external partners (IT service providers, SaaS publishers, HR firms, etc.),…
ARTICLE
Compliance & regulation (5)
Methodology & best practices (3)

10 questions a CISO should ask their SaaS suppliers

Our dependence on service providers and SaaS applications increases every year: HR, payroll, project management, business processes... Third-party risks directly threaten business operations. The approach is now fairly well established for CISOs. For all new suppliers, it is nece…
ARTICLE

External Attack Surface Management: assess, prioritise, remediate

External Attack Surface Management (EASM): assess, prioritize, remediate External Attack Surface Management (EASM) encompasses the practices, procedures, and tools aimed at mapping, monitoring, and securing all of a company’s digital assets exposed on the Internet. It provides or…
ARTICLE

Supplier Due Diligence: Key steps to secure your partnerships

The due diligence process, also known as reasonable diligence, is an essential in-depth investigation that companies must perform before establishing business relationships with third parties, particularly suppliers. This process often includes a supplier due diligence to assess …
ARTICLE
TPRM trends (4)

TPRM Observatory 2025

Get your copy as soon as the report is released Managing cyber risk associated with suppliers is now a strategic issue for all organisations. In this third edition of the Supplier Cyber Risk Observatory, Board of Cyber and CESIN give a voice to more than 170 CISOs, CIOs, CTOs and…
E-BOOK

2024 Observatory: Suppliers cyber risk

CESIN and Board of Cyber unveil the 2024 Observatory on Cyber Risks Linked to Suppliers This second edition surveyed more than 100 cybersecurity leaders, members of CESIN, from organizations of all sizes and sectors, about how they manage supplier-related cyber risk — methods, to…
E-BOOK