TPCRM 101 Guidebook

1 minute read

September 2020

In the cyber sphere, NIST, ISO, AICPA, and DHS are among the multiple organizations that have offered a definition of cyber risk management. While the multiple definitions of cyber risk all differ to a greater or lesser extent, a few key elements remain the same.

The universal theme of these definitions is the use of risk measurement to discern the likelihood and damage of events that could negatively impact the confidentiality, integrity, availability, and ownership of cyber assets (including systems and the information they store, process, or transmit) and treating them. Managing third-party cyber risk is an attempt to measure the likelihood and negative impacts of a cyber event that could happen due to the third parties in your ecosystem, and working with those third parties to treat the risk they expose you to. 


  1. Why having an effective and efficient Third-Party Cyber Risk Management (TPCRM) program matters

  2. What you need to know to create an effective program

  3. How to optimize your current program

Download the full eBook to learn more.


Are you ready to talk TPCRM? We’re here to help!

Related Articles

About Us

ProcessUnity is a leading provider of cloud-based applications for risk and compliance management. The company’s software as a service (SaaS) platform gives organizations the control to assess, measure, and mitigate risk and to ensure the optimal performance of key business processes. ProcessUnity’s flagship solution, ProcessUnity Vendor Risk Management, protects companies and their brands by reducing risks from third-party vendors and suppliers. ProcessUnity helps customers effectively and efficiently assess and monitor both new and existing vendors – from initial due diligence and onboarding through termination. Headquartered outside of Boston, Massachusetts, ProcessUnity is used by the world’s leading financial service firms and commercial enterprises. For more information, visit