We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPSRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov Goldman is VP of Risk Strategy at Panorays. He’s a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.
SIG logo

What is a SIG and How is it Different Than CAIQ?

Learn about SIG: Third-party security questionnaire repository for information gathering.
5 Key Security Controls That Should Be in Your SOC 2

5 Key SOC 2 Controls Your Organization Must Implement

You want to grow your business, but your customers want to be sure that you have taken steps to prevent unauthorized access to their sensitive data…
Statue of Liberty

What’s NY SHIELD Act and Ensuring Third-Party Compliance

In light of concerns over a growing number of cybersecurity threats and data breaches, New York State passed stricter cybersecurity laws under the NY SHIELD Act….
Risk Quantification

Understanding Risk Quantification for Security Teams

According to Trend Micro, almost half of IT leaders and only 38%…

What is Security Compliance?

Security compliance is the active steps an organization takes to protect its…
Residual Risk

What is Residual Risk and How It Helps…

While there will always be inherent risk any time you enter into…
What is an SBOM and How Does it Help Assess Third-Party Security Risk?

What Is an SBOM and How Does It…

Attackers continue to successfully target third parties, as a way to more…
7 Steps for Adopting with NCSC’s New Supply Chain Security Guidance

7 Steps for Adopting with NCSC’s New Supply…

In response to a rise in supply chain attacks, the UK’s National…
DORA: What Financial Institutions Need to Know

DORA: What Financial Institutions Need to Know

In response to rising frequency and severity of cyberattacks on financial institutions,…
The Impact of EBA Guidelines on Third-Party Risk Management

The Impact of EBA Guidelines on Third-Party Risk…

There are many types of third-party vendors whose activities, as they relate…
Securing Your Suppliers: Complying With Regulations

Securing Your Suppliers: Complying With Regulations

Organizations have much more than just data to lose in a third-party…
7 Facts You Should Know About NYDFS

7 Facts You Should Know About NYDFS

Many organizations must comply with the New York Department of Financial Services…
4 NIST Standards Your Organization Should Align With

4 NIST Standards Your Organization Should Align With

The National Institute of Standards and Technology (NIST), part of the US…
CCPA

3 Key Points About CCPA

What is CCPA? The California Consumer Privacy Act (AB 375), which will…
Tips for Your Vendor Security: Complying With Regulations

Tips for Your Vendor Security: Complying With Regulations

Organizations have much more than just data to lose in a third-party…

Featured Authors

The Fastest and
Easiest Way to Securely
Do Business Together