Learn how to start evaluating the IT risk posed by third parties.

Outsourcing is nothing new. Industries have been embracing service providers for functions they either couldn’t or didn’t want to perform for years. This necessitated integrating business systems and providing these third party vendors with access to corporate networks and computer systems. The risk was generally deemed manageable and rationalized by the business need for those integrated processes — until it wasn’t.

In this white paper, Mike Rothman, President of Securosis outlines how organizations can build a systematic means to evaluate the IT risk posed by their vendors, suppliers, and other third parties.

Download the white paper to learn about:

  • Third-party IT risk
  • Structuring vendor risk management programs
  • Evaluatingvendor risk
  • Ongoing vendor monitoring and communication
Building A Vendor IT Risk Management Program
bitsight