The OCEG GRC Illustrated Series: Addressing Third-Party InfoSec Risk

Managing the process of verifying, remediating where necessary and monitoring the effectiveness of third party controls demands the use of sophisticated and mission-designed technology. In this Illustration, we define the key steps of the process and identify what the future holds for third party information security management.

lock iconTHIS IS MEMBERS-ONLY CONTENT. To continue reading, choose one of the options below.