Your vendor’s security testing results, incident response plans, and breach notification procedures are just a few areas that should be evaluated to identify and manage vendor cybersecurity risk. Your next steps to address a vendor’s poor cybersecurity practices may look different, depending on the situation. Learn more.