Vendor-Provided Resources
Here you can find links to resources supplied by TPRA Vendor Members (TPRM Service Providers). Some of these resources require you to input information to obtain the document.
Note: TPRA does not support one particular service provider over another, nor do we benefit from providing you the links below. Read and implement at your own risk.
If you are a TPRA Vendor Member and have a resource or link you would like to see added to this page, please submit through our Vendor Submissions form, or send it to Meghan Schrader at meghan.schrader@tprassociation.org for review.
Filter by Resource Type
Continuity Strength
Vendor Management Capacity Calculator
January 21, 2026
Do you have enough people to manage your vendor portfolio?
Most teams don't. They're managing 50, 100, 200+ vendors with a skeleton crew, patching together assessments between fire drills and audit prep. Traditional vendor assessment takes 20-30 hours per vendor annually. Your team is drowning in questionnaires while new vendors keep getting added.
This calculator shows you exactly where you stand. Input your vendor count, current staffing, and how often you reassess. You'll see your actual capacity utilization and whether you're underwater.
The results explain why vendor management always feels impossible: Assessments take 3+ weeks. Vendors don't have BCPs. Your analysts are maxed out. The math just doesn't work.
Use this before your next budget conversation. It shows what you're actually short and what automation could free up based on your specific situation.
Center for Financial Professionals (CeFPro)
Connect Magazine - Issue 15
January 20, 2026
Issue 15 of Connect Magazine offers a sharp year-in-review for risk professionals, bringing together the standout themes that shaped 2025. Featuring a curated selection of the year’s most-read articles, the issue captures a period defined by converging pressures - from geopolitical and regulatory shifts to AI acceleration, climate risk, and rising non-financial risk.
Inside, readers revisit the topics that dominated boardroom agendas, including global trade tensions, generative AI, climate stress testing, third-party risk, and the human factors influencing risk decisions, offering a concise snapshot of how the industry navigated a year of constant change.
Center for Financial Professionals (CeFPro)
TPRM in 2025: Cracking the Code on Burnout, Bottlenecks, and Budget Constraints
January 20, 2026
Published in March 2025 in collaboration with CERTA, this CeFPro research examines the growing gaps in third-party risk management across financial services. The report highlights how outdated systems, manual processes, and stretched teams are increasing risk exposure and slowing compliance. Backed by data from leading financial institutions, it explores the disconnect between rising third-party risk complexity and the tools used to manage it, and how leading firms are closing the gap.
Explore the findings to understand how organisations are strengthening TPRM frameworks with greater efficiency and control.
Center for Financial Professionals (CeFPro)
Supplier Stability In Operational Resilience 2025: Follow-Up Insights and Analysis
January 20, 2026
Supplier Stability in Operational Resilience 2025 examines how financial institutions are strengthening resilience as regulatory expectations intensify. Drawing on joint research from Escode and CeFPro, the report highlights critical gaps in supplier risk ownership, cloud dependency, and continuity planning, and explores how software escrow is emerging as a key component of resilience assurance.
Explore the findings to understand where resilience frameworks are succeeding, and where greater accountability is still needed.
Bitsight
Exposed: Cyber Risk in the Financial Sector and Its Supply Chain
January 9, 2026
The financial sector relies on a complex web of technology providers—but many of these third parties present hidden and under-monitored cyber risks. Bitsight analyzed over 41,000 financial organizations and 50,000 vendor relationships to identify the most critical suppliers and assess their cybersecurity performance. The findings reveal systemic risk, poor security hygiene among key vendors, and significant monitoring gaps across the sector.
Key Takeaways
Bitsight identified the 99 most critical third-party suppliers to the financial sector
Some of the largest vendors have the weakest security performance
Unmonitored suppliers have 2.9x more critical CVEs and 2.8x more KEVs
Financial institutions monitor only 36.3% of their vendors on average
Continuous monitoring correlates with improved visibility and stronger risk communication
Download the full report to understand where your greatest supply chain risks may be hiding—and how to proactively reduce exposure.
Bitsight
A Third-Party Risk Management Framework Template: 10 Critical Elements
January 9, 2026
Build a third-party risk management framework that stands up to today’s threats—and tomorrow’s scrutiny.
Third-party risk is no longer just a cybersecurity issue—it’s a business imperative. As regulatory demands tighten and digital ecosystems expand, organizations need a third-party risk management framework that goes beyond checkbox assessments and ad hoc processes.
This eBook serves as your third-party risk management framework template—a structured, scalable guide to managing vendor and third-party cyber risk at every stage of the vendor lifecycle. You’ll discover how to build a defensible, data-driven program that enables visibility, accountability, and continuous improvement.
Whether you're starting from scratch or enhancing an existing third-party risk management program, you’ll learn how to strengthen assessments, streamline workflows, and foster cross-functional collaboration—all while ensuring defensibility and speed.
Bitsight
Top Five AI Governance Questions To Ask in Your Vendor Risk Assessment
January 9, 2026
Is your vendor risk assessment process ready for the AI era?
Download this practical guide to modernizing how you evaluate third-party AI risk. Whether you're conducting a cybersecurity supply chain risk management review or onboarding new partners, this resource helps you dig deeper into how vendors govern, deploy, and secure AI technologies.
Continuity Strength
Vendor Risk Management Survey Results - 2025
January 8, 2026
Thank you to everyone who participated in our vendor risk management research this fall. We analyzed responses from 64 organizations across financial services (59%), technology, healthcare, and manufacturing to identify critical gaps in third-party risk programs. Key findings reveal systematic weaknesses where organizations have implemented initial programs but failed to mature core capabilities:
68.8% lack formal BCP support for vendors
47.2% operate with minimal or reactive monitoring41.9% have no formal resilience scoring methodology
37.5% face significant assessment delays (5+ weeks)
We've organized the complete analysis into five focused reports so you can prioritize topics most relevant to your organization.
Each report includes detailed findings, industry-specific implications, regulatory context, and actionable solutions.
Select your priority reports here: https://continuitystrength.com/vendormgmtsurvey-2025-published-tpra
Looking forward to your feedback on the findings.
NetRise, Inc.
Gaining Device Software and Component Visibility at a Global Asset Management Firm
January 7, 2026
A leading global asset management firm manages trillions of dollars across offices on multiple continents. Its network relies on thousands of third-party devices, including firewalls, virtual private network (VPN) concentrators, branch routers, security cameras, and network access control systems. Despite a mature vulnerability management program, the firm lacked automated visibility into the device software and component inventory inside these systems. Vendor documentation was incomplete, and manual audits were time-consuming and inconsistent.
NetRise, Inc.
The Dependency Mirage: Hidden Vulnerabilities in Compiled Binaries
January 7, 2026
Most organizations trust their SBOMs and vulnerability scanners to reflect what’s running in production — but they don’t. In this RSA Conference session, Craig Heffner, Senior Staff Engineer at NetRise and creator of Binwalk, exposes how hidden dependencies and build-time decisions introduce vulnerabilities invisible to traditional security tools.
Drawing from real-world case studies, the talk reveals how manifest-based scanning reflects intent, not reality — and how Binary Composition Analysis (BCA) exposes what’s truly compiled into your software.
NetRise, Inc.
Fragile by Design: Large-Scale Evidence of Software Supply Chain Risk
January 7, 2026
The software supply chain is more fragile than most realize. In this ThreatCon keynote, NetRise Co-Founder and CEO Thomas Pace shares large-scale evidence from millions of analyzed binaries, firmware images, and software artifacts — revealing systemic risks that traditional AppSec tools overlook.
Learn why visibility into compiled code is the key to building true software assurance — and how NetRise is helping organizations uncover and address hidden vulnerabilities before they become front-page news.