top of page

Vendor-Provided Resources

Here you can find links to resources supplied by TPRA Vendor Members (TPRM Service Providers). Some of these resources require you to input information to obtain the document.

 

Note: TPRA does not support one particular service provider over another, nor do we benefit from providing you the links below. Read and implement at your own risk. 

If you are a TPRA Vendor Member and have a resource or link you would like to see added to this page, please submit through our Vendor Submissions form, or send it to Meghan Schrader at meghan.schrader@tprassociation.org for review.

Filter by Resource Type

ProcessUnity

Aligning Internal Cybersecurity Practices with External Third-Party Risk Management | Whitepaper | ProcessUnity

September 11, 2025

Today’s organizations are protecting their high-value assets and sensitive data from increased cyber attacks by addressing cybersecurity internally and externally.

ProcessUnity

The Rise of ESG in TPRM | Whitepaper | ProcessUnity

September 11, 2025

Gain visibility into ESG-related risk today.

ProcessUnity

4 Keys to Creating a Vendor Risk Management Program That Works | Whitepaper | ProcessUnity

September 11, 2025

Build a consistent process for managing your vendors while facilitating information-sharing throughout your organization.

Aravo

Maturity Calculator: What's your Score?

September 11, 2025

Utilize Aravo's Maturity Calculator to determine your third-party risk program maturity score.

Black Kite

The 2021 Ransomware Risk Pulse: Energy Sector | Whitepaper | Black Kite

September 11, 2025

This whitepaper explores ransomware susceptibility and cyber risk across critical infrastructure supply chains.

RiskRecon by Mastercard

Amazon Web Services Core Assessment Playbook & Questionnaire | Template | RiskRecon

September 11, 2025

A toolkit for assessing third-party cyber risks within AWS configurations.

RiskRecon by Mastercard

Why Third-Party Risk Matters | Whitepaper | RiskRecon

September 11, 2025

RiskRecon details the need to gain a strong understanding of third-party cyber risks.

bottom of page