This website community uses cookies to enhance your experience. Continue to use the site as normal if you agree to the use of cookies. Please review our privacy policy to learn more.
Learn more
OK
Skip to main content (Press Enter).
Login / Register
Skip auxiliary navigation (Press Enter).
Contact
venminder
Skip main navigation (Press Enter).
Toggle navigation
Search Options
Home
Discussions
Latest
Unanswered
Communities
All Communities
My Communities
View All Communities
Education
Education Home
Live Webinars
Interviews
Videos
Podcasts
Glossary
Blog
Industry Conferences
Help
Getting Started
Code of Conduct
About the Community
About Venminder
Information Security
 View Only
Community Home
Discussion
115
Library
40
Members
2.5K
1 to 32 of 32 threads (115 total posts)
Least Recently Updated
Most Recently Updated
Least Replies
Most Replies
Thread Subject A-Z
Thread Subject Z-A
10 per page
50 per page
200 per page
Thread Subject
Replies
Last Post
Status
Third-Party Cyber Security Control Requirements
2
14 days ago
by
Anonymous Member
SME Reviewer
4
one month ago
by
Cheryl Turner
Original post by
Anonymous Member
How do you handle employees using personal devices for business purposes.
5
7 months ago
by
Bradley Martin
Original post by
Anonymous Member
Microsoft Plug-ins
1
7 months ago
by
PAUL PELLETIER
Original post by
Anonymous Member
Validating Vendor FFIEC Framework controls
1
9 months ago
by
Anonymous Member
Reviews in a different language
2
10 months ago
by
Anonymous Member
Vendor Performance Reviews
1
one year ago
by
Anonymous Member
Original post by
samantha mckenzie
Information Security Training
3
one year ago
by
Anonymous Member
OneTrust implementation
2
one year ago
by
Hannah MacDonald
Original post by
Anonymous Member
Information Security Analyst
8
one year ago
by
Jamie Sumter
Original post by
Ashley Kelley
Log4J Vulnerability
14
one year ago
by
Jay Patel
Original post by
Dave Pendroy
On-premise based vendors
5
one year ago
by
Anonymous Member
Original post by
Lou Belsito
Vendor Risk Security Report
0
one year ago
by
Anonymous Member
Review of On-Premise Products
2
one year ago
by
Summer Dobbins
Microsoft issues patches for Exchange Server zero-day exploits
0
2 years ago
by
Ben Koons
Managing Free Software Downloads
4
2 years ago
by
Anonymous Member
Original post by
Melissa Evans
SolarWinds Hack - List of impacted customers
8
2 years ago
by
Anonymous Member
Original post by
Carlos Victoria
Info Sec Risk Ratings...and Quantification
1
2 years ago
by
Anonymous Member
Vendor Management with CISSP
1
2 years ago
by
Wendi Inglis
Original post by
Jennifer McGlynn
SOC Reports Q&A
2
2 years ago
by
Jennifer McGlynn
Original post by
Brittany Padgett
Whitelisting
1
2 years ago
by
Anonymous Member
vendors and cloud software assessment (AWS)
0
2 years ago
by
Anonymous Member
Third Party Incident response
1
2 years ago
by
Anonymous Member
Business Continuity and Disaster Recovery Reviews
2
3 years ago
by
Tammy Burns
Reviewing SOC Reports
3
3 years ago
by
Sandra Taylor
Original post by
Anonymous Member
Data Breach / CyberAttack with Third-Parties
2
3 years ago
by
Kerry Klewer
Original post by
Michele Deo
Telecom Vendor Risks
3
3 years ago
by
Aaron Kirkpatrick
Original post by
Anonymous Member
Business Continuity/Disaster Recovery Q&A
0
3 years ago
by
Brittany Padgett
Cybersecurity Q&A
0
3 years ago
by
Brittany Padgett
Cloud Based Vendors
3
3 years ago
by
Aaron Kirkpatrick
Original post by
Danielle Shanahan
Business Impact Analysis
1
3 years ago
by
Gordon Rudd
Original post by
Tammy Burns
Managing complementary user entity controls
1
3 years ago
by
Aaron Kirkpatrick
Original post by
Lola Bradley
Home
Discussions
Latest
Unanswered
Communities
All Communities
My Communities
View All Communities
Education
Education Home
Live Webinars
Interviews
Videos
Podcasts
Glossary
Blog
Industry Conferences
Help
Getting Started
Code of Conduct
About the Community
About Venminder
Powered by Higher Logic