Information Security

 View Only

1 to 45 of 45 threads (161 total posts)
  Thread Subject Replies Last Post Status
Vetting SaaS Vendors
4 5 days ago by Christine Kitamura
Original post by Michael Prowell
Suppliers providing COTS solutios
2 5 days ago by Mandy de Kock
Original post by Anonymous Member
Job Hunting
5 9 days ago by Elizabeth Ndip
Original post by Anonymous Member
Suppliers providing COTS Software
0 13 days ago by Anonymous Member
CISO Forum with key vendors?
1 15 days ago by Kate Wakefield
Original post by Kevin Gates
FFIEC reviews of third parties for banking industry
1 one month ago by Hilary Jewhurst
Original post by Anonymous Member
NPI Access
1 3 months ago by Dave Howe
Original post by Anonymous Member
Artificial Intelligence Contract Language
4 4 months ago by Heather Garnett
Original post by Rob Urich
Leveraging Data Classification Policies to Drive Informational Risk Assessment
3 5 months ago by Anonymous Member
Original post by Stephen Meyer
Technical checks on Third party Due Diligence
2 6 months ago by Matthew Mauldin
Original post by Anonymous Member
Digital Operational Resilience Act
3 8 months ago by Eric Rosendaul
Original post by Jeremy Pelkey
Digital Operational Resilience Act
0 8 months ago by Jeremy Pelkey
Vendors not completing IT Security Questionnaire via 3rd Party Platform
7 one year ago by Anonymous Member
Original post by David Pittman
Third-Party Cyber Security Control Requirements
2 one year ago by Anonymous Member
SME Reviewer
4 one year ago by Cheryl Turner
Original post by Anonymous Member
How do you handle employees using personal devices for business purposes.
5 one year ago by Bradley Martin
Original post by Anonymous Member
Microsoft Plug-ins
1 one year ago by PAUL PELLETIER
Original post by Anonymous Member
Validating Vendor FFIEC Framework controls
1 one year ago by Anonymous Member
Reviews in a different language
2 one year ago by Anonymous Member
Vendor Performance Reviews
1 2 years ago by Anonymous Member
Original post by samantha mckenzie
Information Security Training
3 2 years ago by Anonymous Member
OneTrust implementation
2 2 years ago by Hannah MacDonald
Original post by Anonymous Member
Information Security Analyst
8 2 years ago by Jamie Sumter
Original post by Ashley Kelley
Log4J Vulnerability
14 2 years ago by Jay Patel
Original post by Dave Pendroy
On-premise based vendors
5 2 years ago by Anonymous Member
Original post by Lou Belsito
Vendor Risk Security Report
0 2 years ago by Anonymous Member
Review of On-Premise Products
2 3 years ago by Summer Dobbins
Microsoft issues patches for Exchange Server zero-day exploits
0 3 years ago by Ben Koons
Managing Free Software Downloads
4 3 years ago by Anonymous Member
Original post by Melissa Evans
SolarWinds Hack - List of impacted customers
8 3 years ago by Anonymous Member
Original post by Carlos Victoria
Info Sec Risk Ratings...and Quantification
1 3 years ago by Anonymous Member
Vendor Management with CISSP
1 3 years ago by Wendi Inglis
Original post by Jennifer McGlynn
SOC Reports Q&A
2 3 years ago by Jennifer McGlynn
Original post by Brittany Padgett
Whitelisting
1 3 years ago by Anonymous Member
vendors and cloud software assessment (AWS)
0 3 years ago by Anonymous Member
Third Party Incident response
1 3 years ago by Anonymous Member
Business Continuity and Disaster Recovery Reviews
2 4 years ago by Tammy Burns
Reviewing SOC Reports
3 4 years ago by Sandra Taylor
Original post by Anonymous Member
Data Breach / CyberAttack with Third-Parties
2 4 years ago by Kerry Klewer
Original post by Michele Deo
Telecom Vendor Risks
3 4 years ago by Aaron Kirkpatrick
Original post by Anonymous Member
Business Continuity/Disaster Recovery Q&A
0 4 years ago by Brittany Padgett
Cybersecurity Q&A
0 4 years ago by Brittany Padgett
Cloud Based Vendors
3 4 years ago by Aaron Kirkpatrick
Original post by Danielle Shanahan
Business Impact Analysis
1 4 years ago by Gordon Rudd
Original post by Tammy Burns
Managing complementary user entity controls
1 4 years ago by Aaron Kirkpatrick
Original post by Lola Bradley