We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:



Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates\ Vendor Management


Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates

November 14, 2018 | Vendor and Partner Management

 Vendor Management Tasks/Roles Cheat Sheet

There are many ways to structure a vendor management program. Here we examine two approaches (traditional and distributed) and detail the vendor management tasks required as well as who within the organization should handle each one. 

Read More »

September 12, 2018 | Vendor and Partner Management

 Vendor Assessment Workflow

Successful vendor assessments are light and attuned to the context in which the vendor operates. This workflow steps through the process of classifying and vetting vendors in a way that results in faster, more accurate assessments without requiring massive questionnaires and a deluge of paperwork. 

Read More »

July 30, 2018 | Vendor and Partner Management

 Security Tool Optimization Workflow

When planning a project to optimize and streamline security vendors and tools, it’s key to have a strategy. This workflow is designed to help you evaluate existing security tools and vendors, and plan for a more lean, efficient security tool strategy in the future. For more, see Optimize Your Vendor Toolset.

Read More »

December 18, 2017 | Vendor and Partner Management

 Vendor Selection Templates

Assessing, qualifying, classifying and managing vendors can be a daunting challenge, but it's critical to an organization's information security strategy. The Vendor Selection Templates offer tips and tricks for assessing a vendor's security posture and ensuring they will be a secure, trustworthy partner. 

Read More »

December 6, 2017 | Security Policies and Strategy

 M&A and Divestiture Security Checklists

These checklists are designed to be a guide to help information security professionals understand the M&A and divestiture processes end-to-end, identify the best places to inject security and determine to-do list items that must be addressed within the deal lifecycle. 

Read More »

October 30, 2017 | Architecture, Configuration and Segmentation

 Internal Network Monitoring Solution Request-for-Proposal (RFP) Template

When creating a request for proposal (RFP) of any kind, the purpose is to ensure prospective vendors can check all of the necessary boxes. This document provides a comprehensive RFP template specifically designed for organizations seeking an internal network monitoring solution.

Read More »