TPRM Program Implementation and Development

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Based on your capabilities assessment results, Schneider Downs also can develop a comprehensive implementation project plan with targeted goals and benchmarking.

This helps to operationalize a Third-Party Risk Management program to achieve the targeted levels of maturity and build the capabilities an organization envisions. Organizations may know where they want their TPRM program to be in the years to come, but without a fine-tuned road map to guide the process, it can become an insurmountable task. Program implementation can include the following:

  • Define/document governance/reporting process and roles/responsibilities
  • Enhance/develop policies, standards, procedures
  • Define/document TPRM lifecycle process 
  • Define/document risk rating scoring and IRQ
  • Define/document skillset requirements
  • Define/document internal/external communication/sharing protocol
  • Develop enterprise-specific TPRM toolkit and define/document measurement/analysis process
  • Define/document monitoring/review program

If your business doesn’t have a TPRM program yet, Schneider Downs can work with you to develop a program that is right for your organization. We can help you build a strong foundation and guide you through each component of our model.

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third-party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

For more information visit gme.junzhi-oa.com/tprm or contact us to get started.

case studies
 
                                    Company impacted by ransomware.
big problem:
Company impacted by ransomware.
big thinking:
Restore system on-site and avoid six-figure ransom.
 
                                    Inefficient tax credit realization.
big problem:
Inefficient tax credit realization.
big thinking:
Identified a $900,000 tax credit, nearly twice as much as prior years.
our thoughts on

SEC Adopts Final Climate Disclosure Rules

Learn more about the SEC's final climate-related disclosure rules and what public companies will need to do moving forward.

read more >

Proposed Bipartisan Tax Plan Released – Overview of the Tax Relief for American Families and Workers Act of 2024

Learn more about the proposed Tax Relief for American Families and Workers Act of 2024 and the highlights included within the Act.

read more >

Understanding CA SB 261: The Greenhouse Gases: Climate-Related Financial Risk Act

Learn more about what public and private companies need to know about CA SB 261, the Greenhouse Gases: Climate-Related Financial Risk Act.

read more >

Tis the Season: Unwrapping the Top Holiday Scams of 2023

Learn about some of the top online scams circulating this holiday season.

read more >

Fraud Week 2023: Frauds of the Rich and the Famous

Learn more about ACFE International Fraud Week and explore famous fraud cases including FTX and the Fyre Festival.

read more >

2024 Cost-of-Living Adjustments for Retirement Plans and IRAs

Learn more about the 2024 cost-of-living-adjustments for retirement plans and IRAs.

read more >

Think Before You Click: Fake Browser Updates are Back in Style

Learn more about the resurgence of one of the oldest malware attack methods in the book: the fake browser update.

read more >

The SEC ‘Names Rule’: Unpacking the Impacts to ESG Funds

Learn more about the impact of the SEC's amendment to the Investment Company Act of 1940 on ESG naming conventions.

read more >

Cybersecurity Awareness Month Celebrates 20 Years

Explore our latest security awareness materials in support of Cybersecurity Awareness Month.

read more >

How LinkedIn and a Phone Call Led to the Massive MGM Ransomware Attack

Learn how social engineering and vishing led to the massive ransomware attack halting operations at MGM Resorts and Casinos.

read more >
contact us

contact us

Pittsburgh
Columbus
Metropolitan Washington