Information Security

 View Only

1 to 28 of 28 threads (99 total posts)
  Thread Subject Replies Last Post Status
Validating Vendor FFIEC Framework controls
1 13 days ago by Anonymous Member
Reviews in a different language
2 2 months ago by Anonymous Member
Vendor Performance Reviews
1 4 months ago by Anonymous Member
Original post by samantha mckenzie
Information Security Training
3 4 months ago by Anonymous Member
OneTrust implementation
2 6 months ago by Hannah MacDonald
Original post by Anonymous Member
Information Security Analyst
8 6 months ago by Jamie Sumter
Original post by Ashley Kelley
Log4J Vulnerability
14 6 months ago by Jay Patel
Original post by Dave Pendroy
On-premise based vendors
5 7 months ago by Anonymous Member
Original post by Lou Belsito
Vendor Risk Security Report
0 one year ago by Anonymous Member
Review of On-Premise Products
2 one year ago by Summer Dobbins
Microsoft issues patches for Exchange Server zero-day exploits
0 one year ago by Ben Koons
Managing Free Software Downloads
4 one year ago by Anonymous Member
Original post by Melissa Evans
SolarWinds Hack - List of impacted customers
8 one year ago by Anonymous Member
Original post by Carlos Victoria
Info Sec Risk Ratings...and Quantification
1 one year ago by Anonymous Member
Vendor Management with CISSP
1 one year ago by Wendi Inglis
Original post by Jennifer McGlynn
SOC Reports Q&A
2 one year ago by Jennifer McGlynn
Original post by Brittany Padgett
Whitelisting
1 2 years ago by Anonymous Member
vendors and cloud software assessment (AWS)
0 2 years ago by Anonymous Member
Third Party Incident response
1 2 years ago by Anonymous Member
Business Continuity and Disaster Recovery Reviews
2 2 years ago by Tammy Burns
Reviewing SOC Reports
3 2 years ago by Sandra Taylor
Original post by Anonymous Member
Data Breach / CyberAttack with Third-Parties
2 2 years ago by Kerry Klewer
Original post by Michele Deo
Telecom Vendor Risks
3 2 years ago by Aaron Kirkpatrick
Original post by Anonymous Member
Business Continuity/Disaster Recovery Q&A
0 2 years ago by Brittany Padgett
Cybersecurity Q&A
0 2 years ago by Brittany Padgett
Cloud Based Vendors
3 2 years ago by Aaron Kirkpatrick
Original post by Danielle Shanahan
Business Impact Analysis
1 2 years ago by Gordon Rudd
Original post by Tammy Burns
Managing complementary user entity controls
1 2 years ago by Aaron Kirkpatrick
Original post by Lola Bradley