TPRM External Assessor Services

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

As the Third-Party Risk Management industry grows, the need for qualified assessor resources compounds.

Many TPRM practices preach industry best practices without having the boots on the ground to consistently execute these practices and adequately evaluate third parties. However, at Schneider Downs, our strength is in our people. Our assessors maintain a trifecta of technical expertise, business knowledge, and keen sense of risk to perform assessments successfully. Our trained assessors are readily available to inject themselves into any organization’s TPRM program and assist in preforming all levels of assessments and executing your TPRM program.

Schneider Downs’ External Assessor model is not a one-size-fits-all approach. We can provide External Assessor services in a multitude of ways to seamlessly fit into an organization’s TPRM program. For example:

  • Virtual assessments
  • On-site assessments
  • Physical and environmental reviews
  • Specialty assessments (e.g.: web application technical review, penetration testing, etc.)
  • Specific subject matter expertise: IT, Cybersecurity, Financial, Operational, Compliance, Business Resiliency, etc. 
  • Pre-contract third party evaluations (prior to acquisition or on-boarding a third party)

Here’s a suggested path for a TPRM assessment lifecycle :

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third-party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

Get more information on our Third-Party Risk Management services or contact us to get started today.

case studies
 
                                    Company impacted by ransomware.
big problem:
Company impacted by ransomware.
big thinking:
Restore system on-site and avoid six-figure ransom.
 
                                    Inefficient tax credit realization.
big problem:
Inefficient tax credit realization.
big thinking:
Identified a $900,000 tax credit, nearly twice as much as prior years.
our thoughts on

SEC Adopts Final Climate Disclosure Rules

Learn more about the SEC's final climate-related disclosure rules and what public companies will need to do moving forward.

read more >

Proposed Bipartisan Tax Plan Released – Overview of the Tax Relief for American Families and Workers Act of 2024

Learn more about the proposed Tax Relief for American Families and Workers Act of 2024 and the highlights included within the Act.

read more >

Understanding CA SB 261: The Greenhouse Gases: Climate-Related Financial Risk Act

Learn more about what public and private companies need to know about CA SB 261, the Greenhouse Gases: Climate-Related Financial Risk Act.

read more >

Tis the Season: Unwrapping the Top Holiday Scams of 2023

Learn about some of the top online scams circulating this holiday season.

read more >

Fraud Week 2023: Frauds of the Rich and the Famous

Learn more about ACFE International Fraud Week and explore famous fraud cases including FTX and the Fyre Festival.

read more >

2024 Cost-of-Living Adjustments for Retirement Plans and IRAs

Learn more about the 2024 cost-of-living-adjustments for retirement plans and IRAs.

read more >

Think Before You Click: Fake Browser Updates are Back in Style

Learn more about the resurgence of one of the oldest malware attack methods in the book: the fake browser update.

read more >

The SEC ‘Names Rule’: Unpacking the Impacts to ESG Funds

Learn more about the impact of the SEC's amendment to the Investment Company Act of 1940 on ESG naming conventions.

read more >

Cybersecurity Awareness Month Celebrates 20 Years

Explore our latest security awareness materials in support of Cybersecurity Awareness Month.

read more >

How LinkedIn and a Phone Call Led to the Massive MGM Ransomware Attack

Learn how social engineering and vishing led to the massive ransomware attack halting operations at MGM Resorts and Casinos.

read more >
contact us
Pittsburgh

contact us

Pittsburgh
Columbus
Metropolitan Washington