Information Security

 View Only

Welcome to the Information Security Community. Here you will find the latest discussions and resources that can help you in this area. This community is dedicated to discussions related to SOCs, business continuity and disaster recovery planning, cybersecurity, and other information security topics and challenges. Note: You will need to Sign In to join in the discussions and access resources. 

About Third-Party Information Security: You're expected to understand your vendor's approach to security. Verifying a vendor’s information security practices are sound is vital to safeguarding your data. It needs to be a requirement since the protection of your data, regardless of the size of your organization, and the protection of each individual customer are fundamental to the success of your organization.

Latest Discussion Posts

  • Profile Picture

    RE: Third-Party Cyber Security Control Requirements

    This message was posted by a user wishing to remain anonymous I am certainly routing for your success here, but I have reservations on what your success rate will be here because of the potential of the overhead your process would cause your vendors. ... More

  • Hey, In this circumstance we would rely on the security requirements we would have established in the contract; which should give us a right to request evidence of adherence from time to time, like Pentest reports or Third-Party Audits. We would also ... More

  • Profile Picture

    Third-Party Cyber Security Control Requirements

    This message was posted by a user wishing to remain anonymous We are in the process of trying to establish a third-party control requirements document (either a Framework or Standard) that would define the cyber security controls that our 3rd parties ... More

  • Profile Picture

    RE: SME Reviewer

    Hi Paulo, I may be able to provide you with some additional information, if you would like. Please email me directly [email has been removed by the Community Manager for privacy reasons. You can message the member directly by clicking their ... More

  • Profile Picture

    RE: SME Reviewer

    This message was posted by a user wishing to remain anonymous We have an in-house InfoSec team that reviews SOCs, but we have utilized Venminder's SOC assessment in the past. You can elect to have the assessment done using the Venminder Exchange fu ... More

Polls