home_banner `

Content Icon

Elevate Your Third-Party Risk Management Program

September 12, 2018 | Faculty Reports | Vendor and Partner Management | By Josh More, IANS Faculty

Third parties allow businesses to be nimble, increase profitability and gain a competitive advantage – but not without risk. In this report, IANS Faculty Josh More explains how to elevate your third-party risk program and move beyond basic questionnaires to a rigorous program to protect your business and your brand.
IANS

— INSIGHTS PORTAL —

 SUBSCRIPTION REQUIRED
Please Login to continue or Become a Client

Related Research

Third-Party API Evaluation Checklist

When assessing the security of a third-party API, it is important to analyze its surface area, content, functionality and associated technologies. This tool details some common issues to check for and address. 

Third-Party Risk Assessment Checklist

This tool provides a checklist of questions designed to uncover risk in a third party. The questions primarily focus on the confidentiality, integrity and availability (CIA) of data, but they also address general business risks. Please note: In each case, the questions focus on how you may incur liability or be injured by a risk resulting from your own activities or those of a client, customer, vendor or supplier.

U.S. States Most Likely to Outsource Cyber Threat Risk Assessments

Nearly half of U.S. states (43%) outsource their cyber threat risk assessments to a third party. About a third (32%) have outsourced forensics and 30 percent outsource audit log analysis.

The Path to Vendor Optimization

Each IANS Topic Guide addresses a single information security issue from a planning, deployment and maintenance perspective. In this installment, we focus on vendor management.


We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.