home_banner `

Content Icon

Vendor Management Tasks/Roles Cheat Sheet

November 14, 2018 | Tools & Templates | Vendor and Partner Management

There are many ways to structure a vendor management program. Here we examine two approaches (traditional and distributed) and detail the vendor management tasks required as well as who within the organization should handle each one. 


Please Login to continue or Become a Client

Related Research

Third-Party API Evaluation Checklist

When assessing the security of a third-party API, it is important to analyze its surface area, content, functionality and associated technologies. This tool details some common issues to check for and address. 

Third-Party Risk Assessment Checklist

This tool provides a checklist of questions designed to uncover risk in a third party. The questions primarily focus on the confidentiality, integrity and availability (CIA) of data, but they also address general business risks. Please note: In each case, the questions focus on how you may incur liability or be injured by a risk resulting from your own activities or those of a client, customer, vendor or supplier.

U.S. States Most Likely to Outsource Cyber Threat Risk Assessments

Nearly half of U.S. states (43%) outsource their cyber threat risk assessments to a third party. About a third (32%) have outsourced forensics and 30 percent outsource audit log analysis.

The Path to Vendor Optimization

Each IANS Topic Guide addresses a single information security issue from a planning, deployment and maintenance perspective. In this installment, we focus on vendor management.

We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.