TPRM Program Support Services

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Schneider Downs has extensive experience building and optimizing the third party risk programs for a variety of clients.

We have managed entire Third Party Risk Management programs across all different maturity levels and various points of the TPRM lifecycle. We have experience working with procurement, compliance, technical, and financial teams along with business functional areas who own third party relationships. Thus, our team can adapt to your program’s needs.

This ongoing support complements our core assessment services, and when combined, our support encourages a new level of TPRM assurance. The following are examples of ways we provide ongoing program support in addition to our traditional external assessment services:

  • Assessment project management, scheduling, and coordination
  • Tracking assessment metrics and reporting to management/TPRM stakeholders
  • Assessment evidence retrieval 
  • Development and maintenance of process documentation
  • TPRM policy and procedures optimization
  • Solutions engineering and software selection
  • Continuation of TPRM program maturity
  • Assist in introducing TPRM to additional business units 
  • Internal risk assessments
  • Penetration testing service implementation

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

For more information visit www.schneiderdowns.com/tprm or contact us to get started.

case studies

 
Let’s discuss preventing ransomware attacks on your company. Email me directly <a href='mailto:twarren@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss preventing ransomware attacks on your company. Email me directly here.
big thinking:
Company impacted by ransomware.
 
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly <a href='mailto:dmorally@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly here.
big thinking:
Inefficient tax credit realization.

our thoughts on

What’s the Difference Between SOC 1 and SOC 2 Reports?

Learn about the differences and similarities between SOC 1 and SOC 2 reports.

read more >

What Are The Top Ten Cybersecurity Strategy Mistakes of 2021?

Learn about the top ten cybersecurity strategy mistakes organizations are making in 2021 and best practices to avoid these common pitfalls.

read more >

Ransomware Attack Shuts Down Major U.S. Pipeline Operator

Learn about the Colonial Pipeline cyber-attack, one of the largest ransomware attacks in American infrastructure history.

read more >

The American Families Plan – Proposed $1.8 Trillion Spending and Tax Plan

Learn more about the American Families Plan, a $1.8 trillion spending proposal envisioned to further boost the economy proposed to congress on April 28, 2021.

read more >

Special Alert: Microsoft Releases Critical Update for Exchange Server

Learn about the critical HAFNIUM Microsoft Security Exchange Patch.

read more >

Top 5 Implementation Lessons Learned Under ASC 842

Learn more about the Top 5 Implementation Lessons Learned while implementing ASC 842 for your organization and how you can get ahead of the game.

read more >

Top Risks to Consider in 2021

Read more about an IIA report which provides perspective from key members of risk management functions and offers insight on potential areas of focus over the next year.

read more >

Building a Strong Phishing Defense

Learn how to strengthen your phishing resilience and cybersecurity posture.

read more >

Pennsylvania PPP Loan Forgiveness and Deductibility of Expenses

Learn more about the PPP Loan Forgiveness and Deductibility of Expenses and what is included in taxable income for Pennsylvania.

read more >

Warning Signs of a Business Email Compromise Attack

Learn about common warning signs of a business email compromise attacks.

read more >
contact us
Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102

[email protected]
p:571.380.9003

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p: 412.261.3644     f: 412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p: 614.621.4060     f: 614.621.4062

Map of DC Office
Washington, D.C.

1660 International Drive
McLean, VA 22102

[email protected]
p: 571.380.9003