Compass IT Compliance Blog / Vendor Management (6)

Vendor Risk Management: Information Security Responsibilities

Vendor Risk Management: Information Security Responsibilities

Welcome back! This article serves as part two in my Vendor Risk Management blog series, continuing the discussion on some important factors of creating and renewing third-party contracts.

Read Story

Vendor Risk Management: Importance of Service Level Agreements

glass-facade-817732_1920

Every organization, at one point or another, regardless of maturity, complexity, or business vertical, will have a need to work with a vendor, partner, or client to move business goals forward and maintain functional operations. Although vendors, partners, and clients have different r …

Read Story

Vendor Management Programs to Prevent Data Disasters

electrician-1080586_1920

If you’ve read any of my prior blog posts, you will know that my background prior to joining Compass IT Compliance included 21 active duty years in the United States Coast Guard. I seem to talk about it quite a bit. One of the perks, depending on where they are sending you, is getting …

Read Story

The Key to Vendor Management: Truly Knowing Your Vendors!

Vendor_Management_Word_Cloud.png

In today's business climate, using vendors or third-party service providers is no longer a luxury, it has become a necessity. Organizations "outsource" key business functions every day for many reasons, some of which include:

Read Story

Vendor Management Requirements for Financial Institutions in New York

Vendor Management Requirements for Financial Institutions in New York

I recently wrote a blog post that discussed legislation in the State of New York that is set to take effect on January 1, 2017. This legislation will effect all financial institutions in the state around Cybersecurity and the development of a formal Cybersecurity program. Click here t …

Read Story

FFIEC Guidance: Revision vs. Update

FFIEC Guidance: Revision vs. Update

When it comes to technology, we hear of terms that are often times confused and interchanged. Some examples of these terms might include Vulnerability Scanning and Penetration Testing. Another example might be the age old debate of Risk Assessment versus Audit. While seemingly similar …

Read Story

Subscribe by email