top of page

Vendor-Provided Resources

Here you can find links to resources supplied by TPRA Vendor Members (TPRM Service Providers). Some of these resources require you to input information to obtain the document.

 

Note: TPRA does not support one particular service provider over another, nor do we benefit from providing you the links below. Read and implement at your own risk. 

If you are a TPRA Vendor Member and have a resource or link you would like to see added to this page, please submit through our Vendor Submissions form, or send it to Meghan Schrader at meghan.schrader@tprassociation.org for review.

Filter by Resource Type

Venminder

Vendor Performance Management: Steps and Questions to Ask

September 11, 2025

A vendor performance management process helps ensure vendors provide your organization with quality products and services within a defined budget and timeline. This includes expectations around areas like compliance, operations, and customer service.

For the vendor performance management process to be effective, organizations must think carefully, plan ahead, and execute consistently. An effective process helps reduce costs, enhance customer satisfaction, mitigate risks, and more.


Download the infographic to learn:

  • Basic steps of vendor performance management

  • Practical ways to manage vendor performance

  • Questions to ask regarding vendor performance

Black Kite

Black Kite Third Party Breach Report 2024

September 11, 2025

In 2023, we saw a fierce battle between security professionals and bad actors, each vying to get one step ahead of the other and stay there.


Case in point: In 2023, there were more third-party breaches (81) than in 2022 (63), but with a smaller cascading impact (251 impacted companies, compared to 298 in 2022). Third-party breach mitigation strategies might be starting to stick, but bad actors are relentless in their pursuit to find and breach any possible security weaknesses.


Our research team aggregated and analyzed data from a variety of OSINT and exclusive resources to identify these evolving strategies for third-party breaches, the profiles of threat actors involved, the most affected sectors, and the most significant breaches of the year.


Our goal? To provide security teams with insights on how the threat landscape is changing so they can better navigate the challenges of third-party risk management.


Dig into the 2024 Black Kite Third-Party Breach Report to learn about:

  • The most common root cause of breaches.

  • The most impacted industries.

  • The most destructive third-party breaches of 2023.

  • Trends in attack aftermath.

RSM

Preparing for new cybersecurity rules: Considerations for NY hospitals

September 11, 2025

In an effort to address cybersecurity threats in hospitals in New York, the state Department of Health proposed a new rule in December aimed at safeguarding hospital systems and nonpublic information.

RSM

Effective utilization of generative AI in third-party risk management programs

September 11, 2025

Leveraging generative AI to enhance vendor processes and deliver more.

Aravo

Time to Get Serious: Maximizing TPRM for a Resilient Future

September 11, 2025

A well-executed TPRM program is not just a cost center but a value generator.


Third-Party Risk Management (TPRM) has evolved from a defensive necessity to a strategic cornerstone for organizational resilience and growth in modern business’s complex and interconnected world. TPRM transforms potential vulnerabilities into organizational strengths and tools for resilience, operational efficiency, and stakeholder trust.


This white paper explores the development of a mature TPRM maturity model and regulatory adaptations, and provides best practices into strategic implementation of people, processes, and technology.


In our latest white paper learn more about:

  • A well-executed TPRM program at a glance

  • Developing, implementing, and maintaining a maturity model

  • Planning and adapting to regulatory demands

  • Leveraging technological advancements, well-trained teams, and strategic systems

OneTrust

4 top-of-mind challenges for CISOs in 2024

September 11, 2025

Bridging the gap between security, risk, and compliance doesn't come without its challenges. See the top-of-mind challenges and questions for CISOs going into the new year.

  • How can risk teams work together to consolidate third-party management?

  • Is it time to rethink the security questionnaire's design?

  • How does security scale and meet demand while maintaining due diligence in an ever-evolving cloud ecosystem?

  • What's being done to introduce — and responsibly use — AI?

Download the infographic 4 top-of-mind challenges for CISOs in 2024 to get more insights into these questions.

Venminder

State of Third-Party Risk Management 2024 Whitepaper

September 11, 2025

Venminder’s State of Third-Party Risk Management 2024 whitepaper provides insight into how organizations manage third-party risk today. Results provide an in-depth look at current practices, challenges, compliance incentives, and third-party risk management benefits for organizations to benchmark their performance and processes against their peers.


For this eighth whitepaper, Venminder surveyed individuals from a wide variety of organizations and industries, including financial services, fintech, retail, food services, insurance, healthcare, information technology, and more, in a nice balance of different sizes ranging from less than $1B assets or less than 100 employees to more than $10B assets or more than 5,000 employees.


This invaluable resource is full of third-party risk industry statistics, providing information you need to be aware of to make informed decisions on topics such as:

  • Organizational structure

  • Program investment

  • Vendor landscape

  • Vendor risk assessments

  • Vendor due diligence questionnaires and documentation requirements

  • Third-party risk management metrics

  • Regulatory focus and exam/audit results

  • Third-party risk management pressures

  • Emerging vendor risks (such as cybersecurity, artificial intelligence, ESG, supplier diversity)

  • Third-party risk management challenges

  • Third-party risk management ROI

  • And much more!

Grab a copy!

Supply Wisdom

Weekly Update: Global Supply Chain Disruptions - The Tigray Conflict: A Humanitarian Crisis in Ethiopia

September 11, 2025

The Tigray conflict is one of the most prominent and long-lasting conflicts in Ethiopia. It began in November 2020 when the Ethiopian Government launched a military offensive against the Tigray People's Liberation Front (TPLF) in the Tigray region.

Exiger

Streamlining Software Security: Harnessing the Power of SBOM with Supply Chain Visibility

September 11, 2025

This article will explore what SBOMs are, why they’re becoming table stakes for compliance, and how they help build software supply chain security.

Exiger

Taking a Closer Look at Three Major Risks to Cotton Sourcing | Blog | Exiger

September 11, 2025

To mitigate risks associated with cotton sourcing, it’s crucial to understand the market forces at play and the restrictions that exert pressure on both suppliers and business customers. Our latest white paper takes a closer look at three of these major risks.

Exiger

Modern Slavery: Supply Chain Lessons Learned Since the UFLPA Was Enacted

September 11, 2025

Exiger recently hosted a panel discussion with trade, technology and security experts to reflect on the law’s enforcement and what lies ahead. Key insights emerged on why the law is so significant and what supply chain lessons businesses can learn today to continue to comply with the UFLPA. See the highlights below.

Breach Siren

MOVEit strikes again… 👀🫠 September Digest

September 11, 2025

Welcome to Open Source, powered by breachsiren, the leading newsletter tracking recent data breaches and how much they cost.

bottom of page