Category



Latest Blogs

All Blogs »

Automating the Vendor Evaluation Process

May 23, 2016 | Vendor and Partner Management
By Adam Ely, IANS Faculty

Evaluating the security posture of third-party vendors can sometimes devolve into a cumbersome process of distributing security questionnaires, pestering vendors for data and then manually combing through responses to determine overall risk. In this Ask-an-Expert live interaction, IANS Faculty Adam Ely suggests ways to streamline the process.

IANS

— CLIENT PORTAL —

LOCKED CONTENT
Please Login to continue



Related Research

3/22/2017 | Written AAE
Setting Requirements for Vendors Storing Sensitive Data


2/27/2017 | Written AAE
Managing Vendors With Disparate Frameworks


11/7/2016 | Written AAE
Identifying Vendor Risk Red Flags


8/13/2015 | Written AAE
Internal Network Monitoring Solution RFP (Template)