We use cookies to ensure you get the best experience on our website.
Visit our Cookie Policy for more information.
Panorays’ Blog

Articles by Dov Goldman

Learn about the latest research and happenings in TPCRM
Dov Goldman - VP of Risk Strategy @ Panorays
Dov Goldman
VP of Risk Strategy @ Panorays
Dov is a serial entrepreneur who’s been involved with third-party programs of all sizes, and is the go-to person for explaining the difference between inherent and residual risk.

Expertise

Dov is a seasoned entrepreneur, navigating the world of startups with finesse. With a knack for breaking down the nuances of third-party risk management, he’s your ultimate guide in explaining inherent versus residual risk. Armed with years of expertise, Dov will untangle the intricacies of risk assessment and demystify the complexities of third-party risk.

Experience

Throughout his extensive career as a technology entrepreneur, Dov has emphasized the human dimension of implementing IT systems and the pragmatic necessity of delivering tangible business outcomes. With decades of experience spanning multiple startups, Dov has collaborated closely with cyber and risk leaders across numerous large enterprises, specializing in third-party risk management.

Cybersecurity Authoritativeness

Dov has earned recognition as a thought leader, adept at simplifying intricate problems and their resolutions into easily understandable terms. Regarded as the ‘third-party therapist’ within the industry, Dov possesses an intuitive understanding of the challenges faced by third-party risk leaders. His engaging speaking engagements and insightful written pieces captivate audiences, blending entertainment with informative content.

Dov has written and been quoted about third party cyber risk and privacy in various papers, cybersecurity news publications, websites and resources, including:

Dov has spoken at and chaired numerous industry events, including recently:

Dov has a number of patents to his name, including one for the design of a third-party cyber risk module:

Education

Dov graduated from Columbia University in New York with a degree in Computer Sciences. His time there was more than just academics—it was a transformative period where he honed his skills and immersed himself in tech competitions and workshops. Columbia equipped him not only with technical expertise but also instilled in him a relentless drive for excellence that defines his career.

Latests Posts by Dov Goldman

What is HIPAA

Getting Ready for HIPAA Compliance Audit

The HIPAA Audit: What to Know Before You Get the Notice The…
How to implement zero trust

Zero Trust: The Core of Your Third-Party Risk…

“Zero trust” is a security strategy to meet today’s increasingly complex cybersecurity…
Integrated Risk Management

How Integrated Risk Management Works With TPRM

According to CheckPoint, 76% of organizations are concerned about cloud security threats…
Inherent Risk

Inherent Risk: Use it to Evaluate Third-Party Risk

According to Black Kite, 39.7% of third-party breaches in 2022 originated from…
SBOM

How an SBOM Helps Assess Third-Party Security Risk

In 2020, a public company based in Tulsa, Oklahoma that sells software…
GRC Cyber Security

GRC Cyber Security: GRC Tools’ Gap in Third-Party…

Understanding the Power of GRC Cyber Security Functionality Cyber Security is an…
CPRA Regulations

What are the CPRA Regulations Versus the CCPA?

In 2021, Black Kite reported leaks of personal information (PI) from 1.5…
SIG

What is a SIG and How is it…

Learn about SIG: Third-party security questionnaire repository for information gathering.
5 Key Security Controls That Should Be in Your SOC 2

5 Key SOC 2 Controls Your Organization Must…

You want to grow your business, but your customers want to be…

What’s NY SHIELD Act and Ensuring Third-Party Compliance

In light of concerns over a growing number of cybersecurity threats and…
Risk Quantification

Understanding Risk Quantification for Security Teams

According to Trend Micro, almost half of IT leaders and only 38%…
Security Compliance

What is Security Compliance?

Security compliance is the active steps an organization takes to protect its…
Residual Risk

What is Residual Risk and How It Helps…

In Q1 of 2023 alone, 6,382,619 records were exposed in the healthcare…
Third-Party Security Risk

What is a Security Risk Assessment?

A security risk assessment (SRA) is designed to help you evaluate risk…
CAIQ

What is the Consensus Assessments Initiative Questionnaire (CAIQ)?

The Cloud Security Alliance’s Consensus Assessment Initiative Questionnaire (CAIQ) is used by…

The Fastest and Easiest Way
to Do Business Together, Securely