We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPSRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov is a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.
Security Compliance

What is Security Compliance?

Security compliance is the active steps an organization takes to protect its…
Residual Risk

What is Residual Risk and How It Helps…

In Q1 of 2023 alone, 6,382,619 records were exposed in the healthcare…
Third-Party Security Risk

What is a Security Risk Assessment?

A security risk assessment (SRA) is designed to help you evaluate risk…
CAIQ

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

The Cloud Security Alliance’s Consensus Assessment Initiative Questionnaire (CAIQ) is used by…
DORA: What Financial Institutions Need to Know

DORA: What Financial Institutions Need to Know

In response to rising frequency and severity of cyberattacks on financial institutions,…
What is Third-Party Security Risk Management

Third-Party Security Risk Management: A Critical Component of…

According to Ponemon Institute, more than half (56%) of organizations in 2022…
What is a Third-Party Vendor

What is a Third-Party Vendor and Why is…

Understanding third-party vendors, benefits, and the criticality of vendor risk management.
Implement Third Party Security Process

3 Quick Tips to Implement a TPSRM Process

Reading the statistics and poring through articles about recent third-party security breaches…
EBA Guidelines

The Impact of EBA Guidelines on Third-Party Risk…

There are many types of third-party vendors whose activities, as they relate…
Security Questionnaires

Why Vendors Hate Security Questionnaires

Just a mention of those long, arduous and often confusing security questionnaires…
Vendor Cybersecurity Risk Management

What is Third-Party Vendor Cybersecurity Risk Management?

Cybersecurity risk management identifies an organization’s potential vulnerabilities and implements a system…
CIA Triad

What is the CIA Triad and How Can…

When most people hear the three letters CIA in succession, they think…
What Is GLBA & How Do You Ensure Third Party Compliance?

What Is GLBA and How Do You Know…

The Gramm-Leach-Bliley Act (GLBA) is one of the most common regulatory compliance…
The National Vulnerability Database (NVD) & Third Party Security

The National Vulnerability Database & Third Party Security…

The National Vulnerability Database is a US government-run system that records a…
Lady Justice

What is OCC and How Does It Affect…

The Office of the Comptroller of the Currency (OCC) is one of…

Featured Authors

The Fastest and Easiest Way
to Do Business Together, Securely