TPRM Training Education and Awareness

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Don’t know where to start when it comes to evaluating your vendors? 

Have the Schneider Downs Third Party Risk Management team present to you and your executive team on what exactly TPRM should mean to your organization, the significance a mature program can provide in protecting your organization’s data, and how to employ best practices. Additionally, we perform specific training topics by request if there are certain areas that your team or management needs.  Topics we have presented on in the past include:

  • How to Mitigate Your TPRM Exposure 
  • Best and Trending Practices in Performing Onsite and Virtual Assessments
  • Managing Cloud Vendor Risks 
  • Secrets Revealed: How SOC Auditors Review a SOC Report

Before you decide to start your own TPRM program or outsource processes, let us guide you as to how to get started and what might work best for your business like we have for various leadership groups and clients.

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

For more information visit www.schneiderdowns.com/tprm or contact us to get started.

case studies

 
Let’s discuss preventing ransomware attacks on your company. Email me directly <a href='mailto:twarren@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss preventing ransomware attacks on your company. Email me directly here.
big thinking:
Company impacted by ransomware.
 
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly <a href='mailto:dmorally@schneiderdowns.com?cc=contactSD@schneiderdowns.com'>here</a>.
big problem:
Let’s discuss opportunities to reduce your company’s tax burden. Email me directly here.
big thinking:
Inefficient tax credit realization.

our thoughts on

What’s the Difference Between SOC 1 and SOC 2 Reports?

Learn about the differences and similarities between SOC 1 and SOC 2 reports.

read more >

What Are The Top Ten Cybersecurity Strategy Mistakes of 2021?

Learn about the top ten cybersecurity strategy mistakes organizations are making in 2021 and best practices to avoid these common pitfalls.

read more >

Ransomware Attack Shuts Down Major U.S. Pipeline Operator

Learn about the Colonial Pipeline cyber-attack, one of the largest ransomware attacks in American infrastructure history.

read more >

The American Families Plan – Proposed $1.8 Trillion Spending and Tax Plan

Learn more about the American Families Plan, a $1.8 trillion spending proposal envisioned to further boost the economy proposed to congress on April 28, 2021.

read more >

Special Alert: Microsoft Releases Critical Update for Exchange Server

Learn about the critical HAFNIUM Microsoft Security Exchange Patch.

read more >

Top 5 Implementation Lessons Learned Under ASC 842

Learn more about the Top 5 Implementation Lessons Learned while implementing ASC 842 for your organization and how you can get ahead of the game.

read more >

Top Risks to Consider in 2021

Read more about an IIA report which provides perspective from key members of risk management functions and offers insight on potential areas of focus over the next year.

read more >

Building a Strong Phishing Defense

Learn how to strengthen your phishing resilience and cybersecurity posture.

read more >

Pennsylvania PPP Loan Forgiveness and Deductibility of Expenses

Learn more about the PPP Loan Forgiveness and Deductibility of Expenses and what is included in taxable income for Pennsylvania.

read more >

Warning Signs of a Business Email Compromise Attack

Learn about common warning signs of a business email compromise attacks.

read more >
contact us
Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p:412.261.3644     f:412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p:614.621.4060     f:614.621.4062

Map of Washington Office
Washington, D.C.

1660 International Drive, Suite 600
McLean, VA 22102

[email protected]
p:571.380.9003

contact us

Map of Pittsburgh Office
Pittsburgh

One PPG Place, Suite 1700
Pittsburgh, PA 15222

[email protected]
p: 412.261.3644     f: 412.261.4876

Map of Columbus Office
Columbus

65 East State Street, Suite 2000
Columbus, OH 43215

[email protected]
p: 614.621.4060     f: 614.621.4062

Map of DC Office
Washington, D.C.

1660 International Drive
McLean, VA 22102

c[email protected]
p: 571.380.9003