home_banner `

Content Icon

Vendor Assessment Workflow

September 12, 2018 | Tools & Templates | Vendor and Partner Management

Successful vendor assessments are light and attuned to the context in which the vendor operates. This workflow steps through the process of classifying and vetting vendors in a way that results in faster, more accurate assessments without requiring massive questionnaires and a deluge of paperwork. 


Please Login to continue or Become a Client

Related Research

Third-Party API Evaluation Checklist

When assessing the security of a third-party API, it is important to analyze its surface area, content, functionality and associated technologies. This tool details some common issues to check for and address. 

Third-Party Risk Assessment Checklist

This tool provides a checklist of questions designed to uncover risk in a third party. The questions primarily focus on the confidentiality, integrity and availability (CIA) of data, but they also address general business risks. Please note: In each case, the questions focus on how you may incur liability or be injured by a risk resulting from your own activities or those of a client, customer, vendor or supplier.

U.S. States Most Likely to Outsource Cyber Threat Risk Assessments

Nearly half of U.S. states (43%) outsource their cyber threat risk assessments to a third party. About a third (32%) have outsourced forensics and 30 percent outsource audit log analysis.

The Path to Vendor Optimization

Each IANS Topic Guide addresses a single information security issue from a planning, deployment and maintenance perspective. In this installment, we focus on vendor management.

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.