TPRM Officer as a Service

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Every successful Third Party Risk Management program needs strategic governance in place to uphold and improve the program’s initiatives.

Many organizations don’t have the resources or bandwidth to hire a full-time TPRM department or even to appoint a TPRM committee. In fact, many organizations don’t even know who should be responsible for TPRM matters.

As experts in the field of TPRM, we understand the various roles and needs associated with TPRM programs. We develop custom packages that clearly demonstrate your control environment and assurance to your customer base. Our wide range of experience related to TPRM has allowed us to provide a wide range of services:

  • Building a customer-facing compliance package
  • Producing copy relating to compliance for your website
  • Answering customer inquiries related to third party requirements:
    • Mapping any of your existing standards-based assessments to third party requirements
    • Mapping your policy set to third party requirements 
  • Management and facilitation of virtual and/or onsite third party assessments 
  • Discussion, evaluation, and counsel through third party requirement remediation efforts (related to identified third party audit findings)
    • Assistance with implementation of solutions related to identified third party audit findings

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

For more information visit www.schneiderdowns.com/tprm or contact us to get started.

case studies

 
Let’s discuss preventing ransomware attacks on your company. Email me directly <a href='mailto:twarren@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss preventing ransomware attacks on your company. Email me directly here.
big thinking:
Company impacted by ransomware.
 
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly <a href='mailto:dmorally@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly here.
big thinking:
Inefficient tax credit realization.

our thoughts on

What’s the Difference Between SOC 1 and SOC 2 Reports?

Learn about the differences and similarities between SOC 1 and SOC 2 reports.

read more >

What Are The Top Ten Cybersecurity Strategy Mistakes of 2021?

Learn about the top ten cybersecurity strategy mistakes organizations are making in 2021 and best practices to avoid these common pitfalls.

read more >

Ransomware Attack Shuts Down Major U.S. Pipeline Operator

Learn about the Colonial Pipeline cyber-attack, one of the largest ransomware attacks in American infrastructure history.

read more >

The American Families Plan – Proposed $1.8 Trillion Spending and Tax Plan

Learn more about the American Families Plan, a $1.8 trillion spending proposal envisioned to further boost the economy proposed to congress on April 28, 2021.

read more >

Special Alert: Microsoft Releases Critical Update for Exchange Server

Learn about the critical HAFNIUM Microsoft Security Exchange Patch.

read more >

Top 5 Implementation Lessons Learned Under ASC 842

Learn more about the Top 5 Implementation Lessons Learned while implementing ASC 842 for your organization and how you can get ahead of the game.

read more >

Top Risks to Consider in 2021

Read more about an IIA report which provides perspective from key members of risk management functions and offers insight on potential areas of focus over the next year.

read more >

Building a Strong Phishing Defense

Learn how to strengthen your phishing resilience and cybersecurity posture.

read more >

Pennsylvania PPP Loan Forgiveness and Deductibility of Expenses

Learn more about the PPP Loan Forgiveness and Deductibility of Expenses and what is included in taxable income for Pennsylvania.

read more >

Warning Signs of a Business Email Compromise Attack

Learn about common warning signs of a business email compromise attacks.

read more >
contact us
Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102

[email protected]
p:571.380.9003

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p: 412.261.3644     f: 412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p: 614.621.4060     f: 614.621.4062

Map of DC Office
Washington, D.C.

1660 International Drive
McLean, VA 22102

[email protected]
p: 571.380.9003