TPRM Program Support Services

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Schneider Downs has extensive experience building and optimizing the third party risk programs for a variety of clients.

We have managed entire Third-Party Risk Management programs across all different maturity levels and various points of the TPRM lifecycle. We have experience working with procurement, compliance, technical, and financial teams along with business functional areas who own third party relationships. Thus, our team can adapt to your program’s needs.

This ongoing support complements our core assessment services, and when combined, our support encourages a new level of TPRM assurance. The following are examples of ways we provide ongoing program support in addition to our traditional external assessment services:

  • Assessment project management, scheduling, and coordination
  • Tracking assessment metrics and reporting to management/TPRM stakeholders
  • Assessment evidence retrieval 
  • Development and maintenance of process documentation
  • TPRM policy and procedures optimization
  • Solutions engineering and software selection
  • Continuation of TPRM program maturity
  • Assist in introducing TPRM to additional business units 
  • Internal risk assessments
  • Penetration testing service implementation

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third-party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

Learn more about our Third-Party Risk Management services or contact us to get started.

case studies
 
                                    Company impacted by ransomware.
big problem:
Company impacted by ransomware.
big thinking:
Restore system on-site and avoid six-figure ransom.
 
                                    Inefficient tax credit realization.
big problem:
Inefficient tax credit realization.
big thinking:
Identified a $900,000 tax credit, nearly twice as much as prior years.
our thoughts on

How LinkedIn and a Phone Call Led to the Massive MGM Ransomware Attack

Learn how social engineering and vishing led to the massive ransomware attack halting operations at MGM Resorts and Casinos.

read more >

Climate Corporate Data Act – What to Know About California SB 253

Learn more about the impact of CA SB 253 – Climate Corporate Data Accountability Act.

read more >

20 Pre-Contract Questions To Ask Your Next SOC 2 Audit Firm

Review some of the top questions to ask prospective audit firms before signing for a SOC 2 audit.

read more >

Five Tax Considerations for Start-up Companies

Read more about five of the most important tax considerations startups often overlook.

read more >

School Yourself on Common Student Loan Cyber Scams

Learn about common cyber scams targeting those impacted by the federal student loan pause ending and pending forgiveness plan ruling.

read more >

Six Common Lease Accounting Adoption Mistakes... and How to Avoid Them

Learn about six common mistakes organizations make when adopting the ASC 842 lease accounting standard.

read more >

SDWMA Thoughts on Silicon Valley Bank

Learn more about the Silicon Valley Bank collapse and why SDWMA embraces diversification.

read more >

Digital Transformation and The Construction Industry: Digital Workflows

Learn about the benefits that digital workflows present to the construction industry.

read more >

SECURE 2.0 Act of 2022: Key Highlights

Learn more about key highlights and provisions of the SECURE 2.0 Act.

read more >

Resolve to Prevent or Detect Financial Statement Fraud in the New Year

Recognize these red flags to prevent financial statement fraud in the new year!

read more >
contact us

contact us

Pittsburgh
Columbus
Metropolitan Washington