Information Security

 View Only

1 to 50 of 61 threads (224 total posts)
  Thread Subject Replies Last Post Status
Secure fax line options
3 15 hours ago by Anonymous Member
Vendor Provided AWS SOC 2 Report and ISO Certificates
5 one month ago by Dave Howe
Original post by Anonymous Member
OneHub alternatives
5 one month ago by Michael Tsutsui
Original post by Shelly Parker
Document Storage Vendors
6 one month ago by Jennifer Watts
Original post by Ashley Balletto
Information Security Policy Assessments
2 7 months ago by Anonymous Member
Ongoing Monitoring for vendors holding PII
2 9 months ago by Premika Mishra
Original post by Anonymous Member
Review of SOC Report and controls
4 9 months ago by Anonymous Member
Original post by Michael Papcunik
risk rating questions
2 9 months ago by Anonymous Member
FedRAMP
1 10 months ago by Aaron Kirkpatrick
Original post by Anonymous Member
On-Site vs On-line Remote Information Security Assessments
3 one year ago by Douglas Frey
Original post by Anonymous Member
SOC2 type 2: 12 months vs less than 12 months
4 one year ago by Jessica Cybulski-Zelek
Original post by Paul Kim
Critical Vendor Tasks
6 one year ago by Cheryl Turner
Original post by Anonymous Member
Third-party security risk management road map
0 one year ago by Anonymous Member
PCI AoC vs Penetration test report
2 one year ago by Anonymous Member
Incident Response team vs Third Party Risk Management team
2 one year ago by Kate Wakefield
Original post by Anonymous Member
Intranet Software
1 one year ago by Megan Feeney
Original post by Anonymous Member
Artificial Intelligence Contract Language
5 one year ago by Robert Warja
Original post by Rob Urich
Vetting SaaS Vendors
4 one year ago by Christine Kitamura
Original post by Michael Prowell
Suppliers providing COTS solutios
2 one year ago by Mandy de Kock
Original post by Anonymous Member
Job Hunting
5 one year ago by Elizabeth Ndip
Original post by Anonymous Member
Suppliers providing COTS Software
0 one year ago by Anonymous Member
CISO Forum with key vendors?
1 one year ago by Kate Wakefield
Original post by Kevin Gates
FFIEC reviews of third parties for banking industry
1 one year ago by Hilary Jewhurst
Original post by Anonymous Member
NPI Access
1 one year ago by Dave Howe
Original post by Anonymous Member
Leveraging Data Classification Policies to Drive Informational Risk Assessment
3 one year ago by Anonymous Member
Original post by Stephen Meyer
Technical checks on Third party Due Diligence
2 2 years ago by Matthew Mauldin
Original post by Anonymous Member
Digital Operational Resilience Act
3 2 years ago by Eric Rosendaul
Original post by Jeremy Pelkey
Digital Operational Resilience Act
0 2 years ago by Jeremy Pelkey
Vendors not completing IT Security Questionnaire via 3rd Party Platform
7 2 years ago by Anonymous Member
Original post by David Pittman
Third-Party Cyber Security Control Requirements
2 2 years ago by Anonymous Member
SME Reviewer
4 2 years ago by Cheryl Turner
Original post by Anonymous Member
How do you handle employees using personal devices for business purposes.
5 3 years ago by Bradley Martin
Original post by Anonymous Member
Microsoft Plug-ins
1 3 years ago by PAUL PELLETIER
Original post by Anonymous Member
Validating Vendor FFIEC Framework controls
1 3 years ago by Anonymous Member
Reviews in a different language
2 3 years ago by Anonymous Member
Vendor Performance Reviews
1 3 years ago by Anonymous Member
Original post by samantha mckenzie
Information Security Training
3 3 years ago by Anonymous Member
OneTrust implementation
2 3 years ago by Hannah MacDonald
Original post by Anonymous Member
Information Security Analyst
8 3 years ago by Jamie Sumter
Original post by Ashley Kelley
Log4J Vulnerability
14 3 years ago by Jay Patel
Original post by Dave Pendroy
On-premise based vendors
5 4 years ago by Anonymous Member
Original post by Lou Belsito
Vendor Risk Security Report
0 4 years ago by Anonymous Member
Review of On-Premise Products
2 4 years ago by Summer Dobbins
Microsoft issues patches for Exchange Server zero-day exploits
0 4 years ago by Ben Koons
Managing Free Software Downloads
4 4 years ago by Anonymous Member
Original post by Melissa Evans
SolarWinds Hack - List of impacted customers
8 4 years ago by Anonymous Member
Original post by Carlos Victoria
Info Sec Risk Ratings...and Quantification
1 5 years ago by Anonymous Member
Vendor Management with CISSP
1 5 years ago by Wendi Inglis
Original post by Jennifer McGlynn
SOC Reports Q&A
2 5 years ago by Jennifer McGlynn
Original post by Brittany Padgett
Whitelisting
1 5 years ago by Anonymous Member