top of page

Vendor-Provided Resources

Here you can find links to resources supplied by TPRA Vendor Members (TPRM Service Providers). Some of these resources require you to input information to obtain the document.

 

Note: TPRA does not support one particular service provider over another, nor do we benefit from providing you the links below. Read and implement at your own risk. 

If you are a TPRA Vendor Member and have a resource or link you would like to see added to this page, please submit through our Vendor Submissions form, or send it to Meghan Schrader at meghan.schrader@tprassociation.org for review.

Filter by Resource Type

Third Party Threat Hunting LLC

AI and Third-Party Risk: Solutions for Assessing and Managing Your AI Vendors and Systems

February 9, 2026

Artificial Intelligence is no longer a future concern—it’s a present-day disruptor. As vendors and partners increasingly adopt AI-enabled products and services, third-party and supply-chain risk professionals face a new challenge: managing a rapidly evolving risk landscape with limited guidance. This book delivers the clarity and structure needed to navigate that complexity.


Designed for business professionals—not just technologists—this practical guide walks readers through the full lifecycle of AI-related vendor risk, from intake to offboarding. With hands-on examples, actionable templates, and real-world use cases, it equips readers to assess and manage AI risk confidently, even in environments without dedicated IT security teams. It also explores how AI can be used within TPRM programs to enhance efficiency and accuracy.

Center for Financial Professionals (CeFPro)

Connect Magazine - Issue 16

January 26, 2026

Connect Magazine Issue 16 explores how financial institutions are navigating an increasingly volatile and interconnected risk landscape. From machine learning under market stress and operational resilience in an uncertain world, to concentration risk, third-party dependencies, regulatory shifts and the growing influence of AI, this issue examines the pressures reshaping risk management as the industry moves toward 2026.


Through expert analysis, trendwatch features and onstage insights from senior risk leaders, Issue 16 highlights the need for anticipatory governance, stronger resilience frameworks, and integrated approaches to managing overlapping disruptions across technology, regulation, geopolitics, and markets.

Continuity Strength

Vendor Management Capacity Calculator

January 21, 2026

Do you have enough people to manage your vendor portfolio?

Most teams don't. They're managing 50, 100, 200+ vendors with a skeleton crew, patching together assessments between fire drills and audit prep. Traditional vendor assessment takes 20-30 hours per vendor annually. Your team is drowning in questionnaires while new vendors keep getting added.

This calculator shows you exactly where you stand. Input your vendor count, current staffing, and how often you reassess. You'll see your actual capacity utilization and whether you're underwater.

The results explain why vendor management always feels impossible: Assessments take 3+ weeks. Vendors don't have BCPs. Your analysts are maxed out. The math just doesn't work.

Use this before your next budget conversation. It shows what you're actually short and what automation could free up based on your specific situation.

Center for Financial Professionals (CeFPro)

Connect Magazine - Issue 15

January 20, 2026

Issue 15 of Connect Magazine offers a sharp year-in-review for risk professionals, bringing together the standout themes that shaped 2025. Featuring a curated selection of the year’s most-read articles, the issue captures a period defined by converging pressures - from geopolitical and regulatory shifts to AI acceleration, climate risk, and rising non-financial risk.

Inside, readers revisit the topics that dominated boardroom agendas, including global trade tensions, generative AI, climate stress testing, third-party risk, and the human factors influencing risk decisions, offering a concise snapshot of how the industry navigated a year of constant change.

Center for Financial Professionals (CeFPro)

TPRM in 2025: Cracking the Code on Burnout, Bottlenecks, and Budget Constraints

January 20, 2026

Published in March 2025 in collaboration with CERTA, this CeFPro research examines the growing gaps in third-party risk management across financial services. The report highlights how outdated systems, manual processes, and stretched teams are increasing risk exposure and slowing compliance. Backed by data from leading financial institutions, it explores the disconnect between rising third-party risk complexity and the tools used to manage it, and how leading firms are closing the gap.

Explore the findings to understand how organisations are strengthening TPRM frameworks with greater efficiency and control.

Center for Financial Professionals (CeFPro)

Supplier Stability In Operational Resilience 2025: Follow-Up Insights and Analysis

January 20, 2026

Supplier Stability in Operational Resilience 2025 examines how financial institutions are strengthening resilience as regulatory expectations intensify. Drawing on joint research from Escode and CeFPro, the report highlights critical gaps in supplier risk ownership, cloud dependency, and continuity planning, and explores how software escrow is emerging as a key component of resilience assurance.

Explore the findings to understand where resilience frameworks are succeeding, and where greater accountability is still needed.

Bitsight

Exposed: Cyber Risk in the Financial Sector and Its Supply Chain

January 9, 2026

The financial sector relies on a complex web of technology providers—but many of these third parties present hidden and under-monitored cyber risks. Bitsight analyzed over 41,000 financial organizations and 50,000 vendor relationships to identify the most critical suppliers and assess their cybersecurity performance. The findings reveal systemic risk, poor security hygiene among key vendors, and significant monitoring gaps across the sector.

Key Takeaways

  • Bitsight identified the 99 most critical third-party suppliers to the financial sector

  • Some of the largest vendors have the weakest security performance

  • Unmonitored suppliers have 2.9x more critical CVEs and 2.8x more KEVs

  • Financial institutions monitor only 36.3% of their vendors on average

  • Continuous monitoring correlates with improved visibility and stronger risk communication

Download the full report to understand where your greatest supply chain risks may be hiding—and how to proactively reduce exposure.

Bitsight

A Third-Party Risk Management Framework Template: 10 Critical Elements

January 9, 2026

Build a third-party risk management framework that stands up to today’s threats—and tomorrow’s scrutiny.

Third-party risk is no longer just a cybersecurity issue—it’s a business imperative. As regulatory demands tighten and digital ecosystems expand, organizations need a third-party risk management framework that goes beyond checkbox assessments and ad hoc processes.


This eBook serves as your third-party risk management framework template—a structured, scalable guide to managing vendor and third-party cyber risk at every stage of the vendor lifecycle. You’ll discover how to build a defensible, data-driven program that enables visibility, accountability, and continuous improvement.


Whether you're starting from scratch or enhancing an existing third-party risk management program, you’ll learn how to strengthen assessments, streamline workflows, and foster cross-functional collaboration—all while ensuring defensibility and speed.

Bitsight

Top Five AI Governance Questions To Ask in Your Vendor Risk Assessment

January 9, 2026

Is your vendor risk assessment process ready for the AI era?

Download this practical guide to modernizing how you evaluate third-party AI risk. Whether you're conducting a cybersecurity supply chain risk management review or onboarding new partners, this resource helps you dig deeper into how vendors govern, deploy, and secure AI technologies.

Continuity Strength

Vendor Risk Management Survey Results - 2025

January 8, 2026

Thank you to everyone who participated in our vendor risk management research this fall. We analyzed responses from 64 organizations across financial services (59%), technology, healthcare, and manufacturing to identify critical gaps in third-party risk programs. Key findings reveal systematic weaknesses where organizations have implemented initial programs but failed to mature core capabilities:

  • 68.8% lack formal BCP support for vendors
    47.2% operate with minimal or reactive monitoring

  • 41.9% have no formal resilience scoring methodology

  • 37.5% face significant assessment delays (5+ weeks)

We've organized the complete analysis into five focused reports so you can prioritize topics most relevant to your organization. 


Each report includes detailed findings, industry-specific implications, regulatory context, and actionable solutions.


Select your priority reports here: https://continuitystrength.com/vendormgmtsurvey-2025-published-tpra


Looking forward to your feedback on the findings.

NetRise, Inc.

Gaining Device Software and Component Visibility at a Global Asset Management Firm

January 7, 2026

A leading global asset management firm manages trillions of dollars across offices on multiple continents. Its network relies on thousands of third-party devices, including firewalls, virtual private network (VPN) concentrators, branch routers, security cameras, and network access control systems. Despite a mature vulnerability management program, the firm lacked automated visibility into the device software and component inventory inside these systems. Vendor documentation was incomplete, and manual audits were time-consuming and inconsistent.

NetRise, Inc.

The Dependency Mirage: Hidden Vulnerabilities in Compiled Binaries

January 7, 2026

Most organizations trust their SBOMs and vulnerability scanners to reflect what’s running in production — but they don’t. In this RSA Conference session, Craig Heffner, Senior Staff Engineer at NetRise and creator of Binwalk, exposes how hidden dependencies and build-time decisions introduce vulnerabilities invisible to traditional security tools.

Drawing from real-world case studies, the talk reveals how manifest-based scanning reflects intent, not reality — and how Binary Composition Analysis (BCA) exposes what’s truly compiled into your software.

bottom of page