The CISO’s Guide to Third-Party Security Management provides the instructions you need to make your organization’s third-party security program effective and scalable.
In particular, it covers how to:
Implement compensating internal controls when your suppliers don’t have or won’t reveal their own
Collaborate with suppliers to ensure success in the remediation process
Create KPIs to help manage, improve the process and demonstrate achievements
Support the originator by clicking the read the rest link below.