Checklist for Third-Party Providers

Ensure you are getting the level of service you expect.

Build a Data Privacy Program – Phase 3: Build the Privacy Roadmap

This phase of the blueprint, Build a Data Privacy Program, will help you to prioritize initiatives based on a collective score that takes into account cost, effort,...

Security Operations Policy for Third-Party Outsourcing

Ensure secure operations of information processing with regards to implementation of an external third party.

Third-Party Security Policy Charter Template

Make sure you that your desire to outsource matches your organization's security mandate.

Service Risk Assessment Questionnaire

Use this tool as part of the blueprint, Build a Vendor Security Assessment Service, to assess the risk associated with purchasing a product or service.

Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology

This phase of the blueprint, Build a Vendor Security Assessment Service, will help you develop procedures and tools to assess vendor risk.

EFAIL: Why You SHOULDN'T Remove PGP and SHOULD Manage Your Threat Models

This PowerPoint deck summarizes the recently publicized OpenPGP and S/MIME vulnerability known as EFAIL and recommends actions that users can take to boost security.

Build a Vendor Security Assessment Service – Phases 1-3

This storyboard will help you build or improve your vendor security assessment service using a risk-based approach to maximize efficiency.

GDPR RACI Chart

Assign responsibilities and deadlines for the GDPR compliance process.

Build a Vendor Security Assessment Service – Executive Brief

Read this Executive Brief to understand why vendor security risk management is becoming an increasing concern for companies and regulators, and what you can do about it.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us