Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPCRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov is a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.

Expertise

Dov is a seasoned entrepreneur, navigating the world of startups with finesse. With a knack for breaking down the nuances of third-party risk management, he’s your ultimate guide in explaining inherent versus residual risk. Armed with years of expertise, Dov will untangle the intricacies of risk assessment and demystify the complexities of third-party risk.

Experience

Throughout his extensive career as a technology entrepreneur, Dov has emphasized the human dimension of implementing IT systems and the pragmatic necessity of delivering tangible business outcomes. With decades of experience spanning multiple startups, Dov has collaborated closely with cyber and risk leaders across numerous large enterprises, specializing in third-party risk management.

Cybersecurity Authoritativeness

Dov has earned recognition as a thought leader, adept at simplifying intricate problems and their resolutions into easily understandable terms. Regarded as the ‘third-party therapist’ within the industry, Dov possesses an intuitive understanding of the challenges faced by third-party risk leaders. His engaging speaking engagements and insightful written pieces captivate audiences, blending entertainment with informative content.

Dov has written and been quoted about third party cyber risk and privacy in various papers, cybersecurity news publications, websites and resources, including:

Dov has spoken at and chaired numerous industry events, including recently:

Dov has a number of patents to his name, including one for the design of a third-party cyber risk module:

Education

Dov graduated from Columbia University in New York with a degree in Computer Sciences. His time there was more than just academics—it was a transformative period where he honed his skills and immersed himself in tech competitions and workshops. Columbia equipped him not only with technical expertise but also instilled in him a relentless drive for excellence that defines his career.

Latests Posts by Dov Goldman

Third-Party Cloud Security

Cloud Security Compliance for TPRM: A Complete Guide

Cloud-first is the new normal. You're running critical workloads in public clouds and relying on dozens of…
What’s Your Risk Strategy? (And Are You Sure It’s Working?)

Supply Chain Risk Management: A Strategic Guide for Modern Resilience

Supply chain risk management isn't a checkbox anymore. It's a core business capability. Your operations, software, and partners are woven into a global web where one…
Digital Supply Chain

A Complete Guide to Cyber Supply Chain Risk Management

Your attack surface isn't just bigger. It's more connected than ever. You're stitching together an entire ecosystem of cloud platforms and SaaS tools, all wired together…
Cyber Threat Intelligence

Cyber Security Supply Chain Attacks: Navigating the 2026…

Cyber security supply chain attacks exploit trust. Instead of hammering away at…
Shorten the Vendor Sales Cycle

Vendor Risk Management Software: The Best Platforms Compared

In 2026, managing vendor risk is no longer a check-the-box exercise for…
Third-party data breaches

What Is the Largest Data Breach in History?

Key Takeaways The MOAB leads: The Mother of All Breaches (2024) is…
Why You Need a System Security Plan for TPRM

Third Party Risk Management Software: The Best Platforms…

Third-party risk management software isn’t optional anymore. Your team likely relies on…
Transition to Cloud Infrastructure

The Role of Cloud Security Posture Management Tools…

Cloud adoption keeps accelerating, and that's exactly where the challenge begins. Your…
Security Compliance

What is Security Compliance?

Security and compliance refer to the active steps an organization takes to…
What is HIPAA

What is HIPAA and How to Stay Compliant…

The HIPAA Audit: What to Know Before You Get the Notice The…
Third Party Data Breaches

Yahoo Data Breaches

The Yahoo data breaches were not a single security incident but a…
Third-Party Data Breaches

Facebook Data Breach

When people search for "Facebook data breach," they're usually trying to make…
Third-party data breaches

LinkedIn Data Breach

LinkedIn's data breach history reflects two distinct security eras. First, there's the…
Anatomy of a Healthcare Data Breach

Twitter Data Breaches

Twitter – now X – is a massive, public-facing platform with hundreds…
Anatomy of a Healthcare Data Breach

Cam4 Data Breach

Cam4 is a high-traffic adult live-streaming platform with millions of performers and…

The Fastest and Easiest Way
to Do Business Together, Securely