The benefits of outsourcing or co-sourcing can be invaluable to your organization. But with reward, of course, comes risk. And inviting managed IT services providers and other outsourced vendors into your operational enterprise introduces potential vulnerabilities into your environment if you don’t keep a close eye on data access controls and overall security practices.
Our whitepaper, 40 Questions to Ask During Vendor Due Diligence, is an essential guidebook that will help ensure your vendor due diligence checklist includes careful examination of third parties’ information security practices, including:
Complete the form to access the full checklist or keep scrolling for some sample questions to ask your third parties about their cybersecurity practices.
Governance & Oversight of Cybersecurity
Risk Assessments & Security Policies
Advanced Threat Protection Controls