Logo of Abilene Advisors
Design in Switzerland
Resources
Last Article

Learn about resources for Risk & Compliance Teams

The hidden risks of AI: What businesses can learn from AI cheating in chess

AI isn't perfect—learn from chess AI cheating incidents and find out how to safeguard your business against emerging cyber threats

DeepSeek vs ChatGPT: What they mean for supplier risk management

DeepSeek AI vs. ChatGPT: A look at features, risks, and data privacy concerns. Learn how supply risk management can help businesses stay secure.

How 4.2 Million Internet Hosts Were Hijacked: What You Need to Know

Discover how vulnerabilities in tunneling protocols expose 4.2M internet hosts to attacks. Learn about the risks, affected regions, and essential steps to protect your network and supply chain.

EU Digital Operational Resilience Act (DORA) & third-party risk management (TPRM) 2025

Learn how DORA strengthens financial resilience through third-party risk management, compliance, and ICT vendor oversight for EU firms.

Starbucks faces cyber attack fallout: Could your coffee routine be at risk?

Ransomware hits Starbucks supply chain—barista pay and schedules disrupted. Could your daily coffee fix be next? Here's what you need to know!

What if your private conversations were leaked? Worst telecom hack in USA history.

Protect your business from telecom hacks like Salt Typhoon. Secure networks, protect data, and build trust with proactive cybersecurity solutions.

Mastering supplier risk management: Your ultimate guide to building resilient and transparent supply chains

Learn how to effectively manage supplier risks by identifying, assessing, and mitigating potential disruptions to ensure smooth operations and compliance.

How Supplier Shield enhances GDPR compliance in vendor management

Learn how Supplier Shield improves GDPR compliance in vendor management with automated risk assessments, consent tracking, and breach notifications.

The hidden costs of Inadequate TPRM: A Swiss perspective

Uncover the hidden costs of poor TPRM in Switzerland. Learn how to protect your business from financial, reputational, and operational risks

The ultimate guide to cybersecurity vendor risk management (VRM) in 2024

Discover the importance of cybersecurity vendor risk management (VRM) in safeguarding your organization. Learn key strategies, best practices, and how to mitigate risks from third-party vendors effectively.

The Importance of third-party risk management in Switzerland's strict regulatory framework

Discover how Swiss regulations impact third-party risks. Learn to protect your business, ensure compliance, and thrive in a complex regulatory landscape.

Showcasing TPRM success: Communicating effectiveness to stakeholders

Win stakeholder support for TPRM by tracking KPIs, risk reduction, demonstrating compliance, improving vendor performance, and leveraging technology.

Cyber supply chain risk management: From visibility gaps to resilience at scale

Build a resilient cyber supply chain risk management program. Learn the latest market trends, key challenges, future predictions, and real-world case studies. Get a 90-day plan to reduce vendor risk and meet regulations like NIS2 and DORA.

Financial services vendor risk management under new regulatory pressure

Financial services vendor risk under new regulatory pressure: explore banking third‑party risk, DORA compliance for vendors, and vendor risk strategies.

Empowering procurement-led third-party risk management

Learn how procurement-led third-party risk management supports NIS2 compliance, boosts resilience, and improves supplier oversight.

Mastering NIS2 compliance: A no-nonsense guide for businesses

Learn how NIS2 changes cybersecurity rules for EU businesses, the risks of non-compliance, and how real-world strategies can help you meet the 2024 deadline and strengthen your security posture.

Top 7 UK third-party risk management challenges: overcoming compliance hurdles

Third-party relationships drive innovation but introduce risks. A KPMG survey found 72% of financial services firms faced operational disruptions from third-party incidents. UK companies must manage these risks while complying with regulations like GDPR.