The SolarWinds attack has cybersecurity leaders everywhere taking a hard look at third-party risk. But it’s one thing to have a fresh strategy and quite another to actually start holding vendors accountable for their own security.
This eBook discusses:
The areas that risk managers commonly overlook;
Key elements of a holistic third-party risk program;
The most effective types of vendor assessments.