TPRM Program Implementation and Development

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Based on your capabilities assessment results, Schneider Downs also can develop a comprehensive implementation project plan with targeted goals and benchmarking.

This helps to operationalize a Third-Party Risk Management program to achieve the targeted levels of maturity and build the capabilities an organization envisions. Organizations may know where they want their TPRM program to be in the years to come, but without a fine-tuned road map to guide the process, it can become an insurmountable task. Program implementation can include the following:

  • Define/document governance/reporting process and roles/responsibilities
  • Enhance/develop policies, standards, procedures
  • Define/document TPRM lifecycle process 
  • Define/document risk rating scoring and IRQ
  • Define/document skillset requirements
  • Define/document internal/external communication/sharing protocol
  • Develop enterprise-specific TPRM toolkit and define/document measurement/analysis process
  • Define/document monitoring/review program

If your business doesn’t have a TPRM program yet, Schneider Downs can work with you to develop a program that is right for your organization. We can help you build a strong foundation and guide you through each component of our model.

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third-party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

For more information visit www.schneiderdowns.com/tprm or contact us to get started.

case studies
 
                                    Company impacted by ransomware.
big problem:
Company impacted by ransomware.
big thinking:
Restore system on-site and avoid six-figure ransom.
 
                                    Inefficient tax credit realization.
big problem:
Inefficient tax credit realization.
big thinking:
Identified a $900,000 tax credit, nearly twice as much as prior years.
our thoughts on

Fraud Week 2023: Frauds of the Rich and the Famous

Learn more about ACFE International Fraud Week and explore famous fraud cases including FTX and the Fyre Festival.

read more >

2024 Cost-of-Living Adjustments for Retirement Plans and IRAs

Learn more about the 2024 cost-of-living-adjustments for retirement plans and IRAs.

read more >

Think Before You Click: Fake Browser Updates are Back in Style

Learn more about the resurgence of one of the oldest malware attack methods in the book: the fake browser update.

read more >

The SEC ‘Names Rule’: Unpacking the Impacts to ESG Funds

Learn more about the impact of the SEC's amendment to the Investment Company Act of 1940 on ESG naming conventions.

read more >

Cybersecurity Awareness Month Celebrates 20 Years

Explore our latest security awareness materials in support of Cybersecurity Awareness Month.

read more >

How LinkedIn and a Phone Call Led to the Massive MGM Ransomware Attack

Learn how social engineering and vishing led to the massive ransomware attack halting operations at MGM Resorts and Casinos.

read more >

Climate Corporate Data Act – What to Know About California SB 253

Learn more about the impact of CA SB 253 – Climate Corporate Data Accountability Act.

read more >

20 Pre-Contract Questions To Ask Your Next SOC 2 Audit Firm

Review some of the top questions to ask prospective audit firms before signing for a SOC 2 audit.

read more >

Five Tax Considerations for Start-up Companies

Read more about five of the most important tax considerations startups often overlook.

read more >

School Yourself on Common Student Loan Cyber Scams

Learn about common cyber scams targeting those impacted by the federal student loan pause ending and pending forgiveness plan ruling.

read more >
contact us

contact us

Pittsburgh
Columbus
Metropolitan Washington