Remove Acceptable Risk Remove Audit Remove Evaluation Remove Security
article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

Begin by determining your organization’s tolerance for cybersecurity risk. After acceptable risk levels have been established, evaluate vendors’ security performance — and if a vendor’s cybersecurity is too lax for your tastes, require that vendor to make improvements as necessary. Security patch management.

article thumbnail

The Difference Between Strategic and Operational Risk

Reciprocity

Since operational risks are constant, varied, and increasingly complex, ORM is an ongoing activity. It is guided by four fundamental principles: Accept no unnecessary risk. Accept risk when benefits outweigh costs. Make risk decisions at the appropriate level. Anticipate and manage risk with planning.