
A More Accurate Method for Collecting Due Diligence Documents from Third Parties
A breakdown for determining which due diligence documents should be requested from each vendor, and how this new method compares to other methods.
A breakdown for determining which due diligence documents should be requested from each vendor, and how this new method compares to other methods.
When vulnerabilities are discovered, it is important to maintain these 5 basic information security standards that remain our first line of defense.
Learn how to review your vendor SOC Reports in 15 minutes. This blog will tell you what to review in SOC Reports, and nothing more.
Learn more about the 6 key qualities listed by the FFIEC and a brief interpretation on how this can be applied to your organization.
In this article, we will examine what the Federal Financial Institutions Examination Council (FFIEC) handbooks say about an information security officer.
Document these seven concepts on each SOC report review to help you ensure your relationship with a vendor is or would be a beneficial relationship for your bank.
In this article, we discuss the Cybersecurity Assessment Tool (CAT) released in June 2015 and how to complete it.
Define a vendor and be prepared for the unexpected when discussing Vendor Management.