|
Information Security Policy Assessments
|
2
|
19 days ago
by
Anonymous Member
|
|
|
Ongoing Monitoring for vendors holding PII
|
2
|
2 months ago
by
Premika Mishra
Original post by
Anonymous Member
|
|
|
Review of SOC Report and controls
|
4
|
2 months ago
by
Anonymous Member
Original post by
Michael Papcunik
|
|
|
risk rating questions
|
2
|
2 months ago
by
Anonymous Member
|
|
|
FedRAMP
|
1
|
3 months ago
by
Aaron Kirkpatrick
Original post by
Anonymous Member
|
|
|
On-Site vs On-line Remote Information Security Assessments
|
3
|
5 months ago
by
Douglas Frey
Original post by
Anonymous Member
|
|
|
SOC2 type 2: 12 months vs less than 12 months
|
4
|
5 months ago
by
Jessica Cybulski-Zelek
Original post by
Paul Kim
|
|
|
Critical Vendor Tasks
|
6
|
6 months ago
by
Cheryl Turner
Original post by
Anonymous Member
|
|
|
Third-party security risk management road map
|
0
|
7 months ago
by
Anonymous Member
|
|
|
PCI AoC vs Penetration test report
|
2
|
8 months ago
by
Anonymous Member
|
|
|
Incident Response team vs Third Party Risk Management team
|
2
|
8 months ago
by
Kate Wakefield
Original post by
Anonymous Member
|
|
|
Intranet Software
|
1
|
9 months ago
by
Megan Feeney
Original post by
Anonymous Member
|
|
|
Artificial Intelligence Contract Language
|
5
|
10 months ago
by
Robert Warja
Original post by
Rob Urich
|
|
|
Vetting SaaS Vendors
|
4
|
one year ago
by
Christine Kitamura
Original post by
Michael Prowell
|
|
|
Suppliers providing COTS solutios
|
2
|
one year ago
by
Mandy de Kock
Original post by
Anonymous Member
|
|
|
Job Hunting
|
5
|
one year ago
by
Elizabeth Ndip
Original post by
Anonymous Member
|
|
|
Suppliers providing COTS Software
|
0
|
one year ago
by
Anonymous Member
|
|
|
CISO Forum with key vendors?
|
1
|
one year ago
by
Kate Wakefield
Original post by
Kevin Gates
|
|
|
FFIEC reviews of third parties for banking industry
|
1
|
one year ago
by
Hilary Jewhurst
Original post by
Anonymous Member
|
|
|
NPI Access
|
1
|
one year ago
by
Dave Howe
Original post by
Anonymous Member
|
|
|
Leveraging Data Classification Policies to Drive Informational Risk Assessment
|
3
|
one year ago
by
Anonymous Member
Original post by
Stephen Meyer
|
|
|
Technical checks on Third party Due Diligence
|
2
|
one year ago
by
Matthew Mauldin
Original post by
Anonymous Member
|
|
|
Digital Operational Resilience Act
|
3
|
one year ago
by
Eric Rosendaul
Original post by
Jeremy Pelkey
|
|
|
Digital Operational Resilience Act
|
0
|
one year ago
by
Jeremy Pelkey
|
|
|
Vendors not completing IT Security Questionnaire via 3rd Party Platform
|
7
|
one year ago
by
Anonymous Member
Original post by
David Pittman
|
|
|
Third-Party Cyber Security Control Requirements
|
2
|
2 years ago
by
Anonymous Member
|
|
|
SME Reviewer
|
4
|
2 years ago
by
Cheryl Turner
Original post by
Anonymous Member
|
|
|
How do you handle employees using personal devices for business purposes.
|
5
|
2 years ago
by
Bradley Martin
Original post by
Anonymous Member
|
|
|
Microsoft Plug-ins
|
1
|
2 years ago
by
PAUL PELLETIER
Original post by
Anonymous Member
|
|
|
Validating Vendor FFIEC Framework controls
|
1
|
2 years ago
by
Anonymous Member
|
|
|
Reviews in a different language
|
2
|
2 years ago
by
Anonymous Member
|
|
|
Vendor Performance Reviews
|
1
|
3 years ago
by
Anonymous Member
Original post by
samantha mckenzie
|
|
|
Information Security Training
|
3
|
3 years ago
by
Anonymous Member
|
|
|
OneTrust implementation
|
2
|
3 years ago
by
Hannah MacDonald
Original post by
Anonymous Member
|
|
|
Information Security Analyst
|
8
|
3 years ago
by
Jamie Sumter
Original post by
Ashley Kelley
|
|
|
Log4J Vulnerability
|
14
|
3 years ago
by
Jay Patel
Original post by
Dave Pendroy
|
|
|
On-premise based vendors
|
5
|
3 years ago
by
Anonymous Member
Original post by
Lou Belsito
|
|
|
Vendor Risk Security Report
|
0
|
3 years ago
by
Anonymous Member
|
|
|
Review of On-Premise Products
|
2
|
4 years ago
by
Summer Dobbins
|
|
|
Microsoft issues patches for Exchange Server zero-day exploits
|
0
|
4 years ago
by
Ben Koons
|
|
|
Managing Free Software Downloads
|
4
|
4 years ago
by
Anonymous Member
Original post by
Melissa Evans
|
|
|
SolarWinds Hack - List of impacted customers
|
8
|
4 years ago
by
Anonymous Member
Original post by
Carlos Victoria
|
|
|
Info Sec Risk Ratings...and Quantification
|
1
|
4 years ago
by
Anonymous Member
|
|
|
Vendor Management with CISSP
|
1
|
4 years ago
by
Wendi Inglis
Original post by
Jennifer McGlynn
|
|
|
SOC Reports Q&A
|
2
|
4 years ago
by
Jennifer McGlynn
Original post by
Brittany Padgett
|
|
|
Whitelisting
|
1
|
4 years ago
by
Anonymous Member
|
|
|
vendors and cloud software assessment (AWS)
|
0
|
4 years ago
by
Anonymous Member
|
|
|
Third Party Incident response
|
1
|
4 years ago
by
Anonymous Member
|
|
|
Business Continuity and Disaster Recovery Reviews
|
2
|
5 years ago
by
Tammy Burns
|
|
|
Reviewing SOC Reports
|
3
|
5 years ago
by
Sandra Taylor
Original post by
Anonymous Member
|
|