article thumbnail

Preparation Continues for the Digital Operational Resilience Act

Fusion Risk Management

Currently, TSPs are subject to financial service providers’ requirements via contractual obligations (such as the European Banking Authority’s third-party outsourcing requirements). It formalizes existing third-party outsourcing requirements and provides more prescriptive guidance on regulatory expectations. Audit Access.

article thumbnail

TSPs: Making the Case to Invest in Risk and Resiliency

Fusion Risk Management

A bottom-up approach occurs when teams are issue spotting via speaking up about issues that they are encountering, control testing, or remediating audit findings. Contractual Obligations. Closely related to being viewed as a better partner are the many contractual obligations that can be imposed upon your organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing ICT third-party risk under DORA regulation

Fusion Risk Management

As organizations begin to determine the impact that DORA has on their specific business, a common thread has emerged: while Information and Communication Technology (ICT) Third-Party Risk Management (TPRM) is its own pillar in the regulation, TPRM touches on all other pillars of the regulation.

article thumbnail

Severe Weather Preparedness: Managing Severe Weather Events During Other Crises

everbridge

A unified emergency software platform can also automate action plans, SOPs, and communications so that teams have the information and data they need to act quickly. Be ready to outsource to consultants or contractors in case there are gaps. Most importantly, stress test these systems and software.

article thumbnail

Ten lessons from a cyber attack response exercise

Plan B Consulting

If the personal information of your staff held by the organisation was compromised, including their dates of birth and financial information, do you have in place a pre-written communication which informs them of the risk and goes through the process for staff to check if they could be a victim of identity fraud and givie them useful advice?

article thumbnail

Ten lessons from a cyber attack response exercise

Plan B Consulting

If the personal information of your staff held by the organisation was compromised, including their dates of birth and financial information, do you have in place a pre-written communication which informs them of the risk and goes through the process for staff to check if they could be a victim of identity fraud and givie them useful advice?

article thumbnail

Important KPIs for Successful Vendor Management

Reciprocity

Before outsourcing your business processes or striking some other deal with vendors, you do need to assess the risks they pose. If your vendor needs to meet a compliance standard or regulation, check recent security audits to review how well it manages compliance with that standard. Communication. Cybersecurity. Staff training.