The OCEG GRC Illustrated Series: Addressing Third-Party InfoSec Risk

Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this Illustration, we define the key steps of the process and identify what the future holds for third party information security management.

THIS IS MEMBERS-ONLY CONTENT

SINGLE MEMBERSHIP                                             CORPORATE MEMBERSHIP

You are not logged in and do not have access to members-only content.

If you are already a registered user or a member, SIGN IN now.