|
Vetting SaaS Vendors
|
4
|
5 days ago
by
Christine Kitamura
Original post by
Michael Prowell
|
|
|
Suppliers providing COTS solutios
|
2
|
5 days ago
by
Mandy de Kock
Original post by
Anonymous Member
|
|
|
Job Hunting
|
5
|
9 days ago
by
Elizabeth Ndip
Original post by
Anonymous Member
|
|
|
Suppliers providing COTS Software
|
0
|
13 days ago
by
Anonymous Member
|
|
|
CISO Forum with key vendors?
|
1
|
15 days ago
by
Kate Wakefield
Original post by
Kevin Gates
|
|
|
FFIEC reviews of third parties for banking industry
|
1
|
one month ago
by
Hilary Jewhurst
Original post by
Anonymous Member
|
|
|
NPI Access
|
1
|
3 months ago
by
Dave Howe
Original post by
Anonymous Member
|
|
|
Artificial Intelligence Contract Language
|
4
|
4 months ago
by
Heather Garnett
Original post by
Rob Urich
|
|
|
Leveraging Data Classification Policies to Drive Informational Risk Assessment
|
3
|
5 months ago
by
Anonymous Member
Original post by
Stephen Meyer
|
|
|
Technical checks on Third party Due Diligence
|
2
|
6 months ago
by
Matthew Mauldin
Original post by
Anonymous Member
|
|
|
Digital Operational Resilience Act
|
3
|
8 months ago
by
Eric Rosendaul
Original post by
Jeremy Pelkey
|
|
|
Digital Operational Resilience Act
|
0
|
8 months ago
by
Jeremy Pelkey
|
|
|
Vendors not completing IT Security Questionnaire via 3rd Party Platform
|
7
|
one year ago
by
Anonymous Member
Original post by
David Pittman
|
|
|
Third-Party Cyber Security Control Requirements
|
2
|
one year ago
by
Anonymous Member
|
|
|
SME Reviewer
|
4
|
one year ago
by
Cheryl Turner
Original post by
Anonymous Member
|
|
|
How do you handle employees using personal devices for business purposes.
|
5
|
one year ago
by
Bradley Martin
Original post by
Anonymous Member
|
|
|
Microsoft Plug-ins
|
1
|
one year ago
by
PAUL PELLETIER
Original post by
Anonymous Member
|
|
|
Validating Vendor FFIEC Framework controls
|
1
|
one year ago
by
Anonymous Member
|
|
|
Reviews in a different language
|
2
|
one year ago
by
Anonymous Member
|
|
|
Vendor Performance Reviews
|
1
|
2 years ago
by
Anonymous Member
Original post by
samantha mckenzie
|
|
|
Information Security Training
|
3
|
2 years ago
by
Anonymous Member
|
|
|
OneTrust implementation
|
2
|
2 years ago
by
Hannah MacDonald
Original post by
Anonymous Member
|
|
|
Information Security Analyst
|
8
|
2 years ago
by
Jamie Sumter
Original post by
Ashley Kelley
|
|
|
Log4J Vulnerability
|
14
|
2 years ago
by
Jay Patel
Original post by
Dave Pendroy
|
|
|
On-premise based vendors
|
5
|
2 years ago
by
Anonymous Member
Original post by
Lou Belsito
|
|
|
Vendor Risk Security Report
|
0
|
2 years ago
by
Anonymous Member
|
|
|
Review of On-Premise Products
|
2
|
3 years ago
by
Summer Dobbins
|
|
|
Microsoft issues patches for Exchange Server zero-day exploits
|
0
|
3 years ago
by
Ben Koons
|
|
|
Managing Free Software Downloads
|
4
|
3 years ago
by
Anonymous Member
Original post by
Melissa Evans
|
|
|
SolarWinds Hack - List of impacted customers
|
8
|
3 years ago
by
Anonymous Member
Original post by
Carlos Victoria
|
|
|
Info Sec Risk Ratings...and Quantification
|
1
|
3 years ago
by
Anonymous Member
|
|
|
Vendor Management with CISSP
|
1
|
3 years ago
by
Wendi Inglis
Original post by
Jennifer McGlynn
|
|
|
SOC Reports Q&A
|
2
|
3 years ago
by
Jennifer McGlynn
Original post by
Brittany Padgett
|
|
|
Whitelisting
|
1
|
3 years ago
by
Anonymous Member
|
|
|
vendors and cloud software assessment (AWS)
|
0
|
3 years ago
by
Anonymous Member
|
|
|
Third Party Incident response
|
1
|
3 years ago
by
Anonymous Member
|
|
|
Business Continuity and Disaster Recovery Reviews
|
2
|
4 years ago
by
Tammy Burns
|
|
|
Reviewing SOC Reports
|
3
|
4 years ago
by
Sandra Taylor
Original post by
Anonymous Member
|
|
|
Data Breach / CyberAttack with Third-Parties
|
2
|
4 years ago
by
Kerry Klewer
Original post by
Michele Deo
|
|
|
Telecom Vendor Risks
|
3
|
4 years ago
by
Aaron Kirkpatrick
Original post by
Anonymous Member
|
|
|
Business Continuity/Disaster Recovery Q&A
|
0
|
4 years ago
by
Brittany Padgett
|
|
|
Cybersecurity Q&A
|
0
|
4 years ago
by
Brittany Padgett
|
|
|
Cloud Based Vendors
|
3
|
4 years ago
by
Aaron Kirkpatrick
Original post by
Danielle Shanahan
|
|
|
Business Impact Analysis
|
1
|
4 years ago
by
Gordon Rudd
Original post by
Tammy Burns
|
|
|
Managing complementary user entity controls
|
1
|
4 years ago
by
Aaron Kirkpatrick
Original post by
Lola Bradley
|
|