Information security news, help and resources - SearchSecurity.co.uk
Premium Content

Access "Vendor risk management and the CISO"

Eric Holmquist Published: 13 Oct 2012

Every business today depends to some extent on third parties -- it's a reality that's becoming even more pronounced as companies move to more cloud-based services. And in order to effectively provide a product or service, a certain percentage of those third parties will require access to confidential corporate and/or customer information. Obviously, it is incumbent on management to ensure that not only is the third party capable, but also in the course of its operations can ensure that the data entrusted to it remains secure. Traditional vendor management programs have tended to focus to a large degree on "ability to deliver" with data security being an almost secondary consideration. What managers often fail to fully appreciate, especially for large or very visible companies, is that while a third party's failure to deliver would in all likelihood be operationally disruptive, a massive data breach could be devastating. The challenge for companies is how to ensure protection when they often have little ability to monitor day-to-day operations, evaluate the ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Safe Harbor

What's Inside

Features

More Premium Content Accessible For Free

  • Middle East IT Priorities 2016
    BIG MiddleEast IT Priorities 2016.jpg
    E-Handbook

    Computer Weekly’s annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East ...

  • Europe IT Priorities 2016
    BIG Europe IT Priorities 2016.jpg
    E-Handbook

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming ...

  • Women in Technology Survey 2016
    Women-in-Technology-Survey-2016-cover-252px.jpg
    E-Handbook

    The Mortimer Spinks and Computer Weekly Women in Technology Survey 2016 collected data between 10 April and 28 May 2016, and represents the views of ...