New & Notable
News
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.
Evaluate
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.
Manage
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives.
Get Started
Top 5 steps in the risk management process
Implementing an effective risk management process is a key part of managing business risks. Follow these five steps to ensure a successful process.
Trending Topics
-
CIO Strategy News
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants two companies to divest assets before merging.
-
Digital Transformation Manage
Emerging technologies in construction help manage work, risk
Emerging technologies in construction include AI and digital twins. Read how companies use advanced IT to improve risk analysis, forecasting, and more.
-
Risk Management & Governance Evaluate
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.
-
Apps, Infrastructure and Operations News
Early-stage tech companies comb through data, software code
Software startups participating in the 2025 MIT Sloan CIO Symposium's Innovation Showcase take on the challenge of picking out the key signals from vast amounts of data.
-
Cloud deployment and architecture Evaluate
Examine the 4 types of edge computing, with examples
Edge computing is popular, but it's not going to benefit every IoT device or workload. Look at the various types of edge computing and examples. Are you ready to push it to the edge?
-
Data security and privacy News
News brief: Week's top breaches stem from third-party attacks
Check out the latest security news from the Informa TechTarget team.
Sponsored Sites
-
Multicloud
Multicloud by Design: The Modern Path to IT Simplicity, Agility and Control
Learn how Organizations must leverage best-in-class technology across public cloud and on-premises environments to address today’s opportunities in digital and workplace transformation.
-
Cloud
Optimize Your Cloud Migration with AWS & Infoblox
-
Artificial Intelligence
Deloitte & Snowflake: Generative AI
Find Solutions For Your Project
-
Evaluate
What is vendor risk management (VRM)? A guide for businesses
Vendor risk management identifies, assesses and mitigates risks from third-party vendors to protect companies from data breaches, operational disruptions and compliance violations.
-
A guide to risk registers: Benefits and examples
-
Learn how to harness strategic risk and improve your operations
-
What is risk monitoring? Definition and best practices
-
-
Problem Solve
How to attract tech talent in 2025: 7 essentials
In this time of 'the great churn,' finding and keeping great tech talent sounds merely aspirational. Read on for seven methods that work.
-
How quantum computing can improve supply chains
-
What is quantum error correction?
-
Quantum computing in finance: Key use cases
-
-
Manage
Compliance stakeholders and how to work with them
Stakeholders' involvement can strengthen an organization's compliance program. Learn best practices for engaging key stakeholders in compliance initiatives.
-
Key steps to developing a healthy risk culture
-
What is risk identification? Importance and methods
-
Enterprise risk management team: Roles and responsibilities
-
CIO Basics
-
Get Started
What is third-party risk management (TPRM)?
Third-party risk management (TPRM) is a comprehensive framework for identifying, assessing, and mitigating risks associated with using external vendors, suppliers, partners and service providers.
-
Get Started
Top 5 steps in the risk management process
Implementing an effective risk management process is a key part of managing business risks. Follow these five steps to ensure a successful process.
-
Get Started
A guide to risk registers: Benefits and examples
Risk registers document, prioritize and track an organization's risk, providing organizations with a holistic view of risk and a ready way to communicate their risk strategies.
Multimedia
-
News
View All -
CIO strategy
FTC sends message with Synopsys, Ansys divestiture order
To prevent the creation of a monopoly in software tools used to design semiconductors, the FTC wants two companies to divest assets before merging.
-
CIO strategy
UK backdoor order to Apple raises bipartisan concerns
U.S. officials fear that gaps in existing law may enable countries to target U.S. companies with data access requests that harm user privacy and security.
-
Risk management and governance
U.S. policy moves reflect big tech issues with state AI laws
House Republicans proposed a 10-year moratorium on state AI rules, reflecting a concern among tech companies about the growing patchwork of state AI and data privacy measures.
Search CIO Definitions
- What is third-party risk management (TPRM)?
- What is scenario analysis?
- What is risk acceptance?
- What is fourth-party risk management (FPRM)?
- What is a compliance framework?
- What is a risk manager? Roles and responsibilities
- What is crowdsourcing?
- What is compliance risk?