top of page

Blog
Search


The Dangerous Assumption: Security Sign-Off = Privacy Compliance
It is a mistake I keep seeing, even in organizations that think they have a mature third-party risk program. They treat privacy as just another category of security.
Corina
Jul 274 min read
Â
Â
Â


This Is Why Your TPRM (Third-party Risk Management) Program Fails
Most third-party risk management (TPRM) programs are built with good intentions. Clear policies. Templates. Checklists. Intake forms. On...
Corina
Apr 273 min read
Â
Â
Â


No, a DPIA Is Not a Vendor Privacy Assessment
No, a DPIA Is Not a Vendor Privacy Assessment
Corina
Apr 143 min read
Â
Â
Â


Privacy Risk Is Not a Line Item
When I started looking into how to build a third-party risk program that actually made sense for privacy, I figured something would...
Corina
Apr 142 min read
Â
Â
Â


Most Third-Party Privacy Risk Programs Don’t Start with a Strategy — They Start with a Spreadsheet
Most third-party privacy risk programs don’t start with a strategy. They start with a spreadsheet. A massive, well-intentioned tracker...
Corina
Apr 142 min read
Â
Â
Â
bottom of page