The Bedel Security Blog

Information security expertise exclusively for you.

Sign Up Today

Vendor Management

Business handshake illustrating trust and verification in managed security services.

2 min read

Trust but Verify: Managing your Managed Security Service Provider

Perhaps you outsourced your security monitoring and incident response to a reputable firm years ago, or are considering a change to outsource for the...

Read More

2 min read

How to Approach Third Party Reviews

One of the most important processes in cybersecurity for financial institutions today is third-party due diligence. However, it is also one of the...

Read More

1 min read

Vendor Data Sharing: Why “Need to Know” Is a Must for Financial Institutions

Vendors play a crucial role in helping financial institutions deliver modern, efficient, and client-focused services. But with every data exchange...

Read More

2 min read

Reviewing the New Interagency Third-Party Risk Management Guidance

On June 6th, the Federal Reserve, FDIC, and OCC released new interagency guidance on third-party risk management. The new guidance, based on existing...

Read More

1 min read

Outsourcing IT

It’s common practice for financial institutions to outsource some or all of their Information Technology (IT) functions to a Managed Service Provider...

Read More

2 min read

What Does it Mean to be a Good Partner?

While the definition of a partner is fairly broad, its principles apply to a very broad spectrum of relationships. In the cybersecurity realm, this...

Read More

4 min read

Independent Collaboration Part 1: A Concept for Outsourcing IT in Financial Institutions

It sounds like a total oxymoron: Independent Collaboration. On the Predictive Index, those two words are on opposing ends of the spectrum when it...

Read More

3 min read

SolarWinds: 5 Points to Communicate to Your Board

As most SolarWinds investigations have stabilized, it’s a good time to give the full report to your Board of Directors. They’ve hopefully been...

Read More
Virtual CISO

3 min read

Awareness: Understand the Options for Maturing Your Cybersecurity

This blog post is going to sound a little bit self-serving, but I promise you it's not intended to be that way.

Read More