TPRM Program Support Services

PRIMARY CONTACTS:
Eric M. Wright CPA, CITP
William M. Deller CISA, CTPRP, CTPRA, CCSFP

Schneider Downs has extensive experience building and optimizing the third party risk programs for a variety of clients.

We have managed entire Third-Party Risk Management programs across all different maturity levels and various points of the TPRM lifecycle. We have experience working with procurement, compliance, technical, and financial teams along with business functional areas who own third party relationships. Thus, our team can adapt to your program’s needs.

This ongoing support complements our core assessment services, and when combined, our support encourages a new level of TPRM assurance. The following are examples of ways we provide ongoing program support in addition to our traditional external assessment services:

  • Assessment project management, scheduling, and coordination
  • Tracking assessment metrics and reporting to management/TPRM stakeholders
  • Assessment evidence retrieval 
  • Development and maintenance of process documentation
  • TPRM policy and procedures optimization
  • Solutions engineering and software selection
  • Continuation of TPRM program maturity
  • Assist in introducing TPRM to additional business units 
  • Internal risk assessments
  • Penetration testing service implementation

Additional TPRM Services

Schneider Downs TPRM Resources

Built by our tenured team of security, risk and compliance practitioners. We have leveraged decades of diverse subject-matter expertise and experience to be able to provide the following resources and tools:

How Can Schneider Downs Help?

The Schneider Downs Risk Advisory Services team has the expertise, credentials and tools to help you build, implement, recalibrate, and manage a world-class third-party risk management program. We understand that outsourcing business functions to third parties is essential in today’s business environment.  While outsourcing provides benefits such as increased efficiency and cost savings, it also increases an organization’s risk exposure to a myriad of threats presented by outsourcing.  Understanding how to identify and manage the risks presented by third party providers is vital for any business.

Learn more about our Third-Party Risk Management services or contact us to get started.

case studies
 
                                    Company impacted by ransomware.
big problem:
Company impacted by ransomware.
big thinking:
Restore system on-site and avoid six-figure ransom.
 
                                    Inefficient tax credit realization.
big problem:
Inefficient tax credit realization.
big thinking:
Identified a $900,000 tax credit, nearly twice as much as prior years.
our thoughts on

SEC Adopts Final Climate Disclosure Rules

Learn more about the SEC's final climate-related disclosure rules and what public companies will need to do moving forward.

read more >

Proposed Bipartisan Tax Plan Released – Overview of the Tax Relief for American Families and Workers Act of 2024

Learn more about the proposed Tax Relief for American Families and Workers Act of 2024 and the highlights included within the Act.

read more >

Understanding CA SB 261: The Greenhouse Gases: Climate-Related Financial Risk Act

Learn more about what public and private companies need to know about CA SB 261, the Greenhouse Gases: Climate-Related Financial Risk Act.

read more >

Tis the Season: Unwrapping the Top Holiday Scams of 2023

Learn about some of the top online scams circulating this holiday season.

read more >

Fraud Week 2023: Frauds of the Rich and the Famous

Learn more about ACFE International Fraud Week and explore famous fraud cases including FTX and the Fyre Festival.

read more >

2024 Cost-of-Living Adjustments for Retirement Plans and IRAs

Learn more about the 2024 cost-of-living-adjustments for retirement plans and IRAs.

read more >

Think Before You Click: Fake Browser Updates are Back in Style

Learn more about the resurgence of one of the oldest malware attack methods in the book: the fake browser update.

read more >

The SEC ‘Names Rule’: Unpacking the Impacts to ESG Funds

Learn more about the impact of the SEC's amendment to the Investment Company Act of 1940 on ESG naming conventions.

read more >

Cybersecurity Awareness Month Celebrates 20 Years

Explore our latest security awareness materials in support of Cybersecurity Awareness Month.

read more >

How LinkedIn and a Phone Call Led to the Massive MGM Ransomware Attack

Learn how social engineering and vishing led to the massive ransomware attack halting operations at MGM Resorts and Casinos.

read more >
contact us

contact us

Pittsburgh
Columbus
Metropolitan Washington