Evaluating security controls of smaller vendors
In the IT Security team where I work, we currently use the Standarized Information Gathering or SIG tool to evaluate IT security posture of prospective 3rd party vendors. What I like about the SIG is the questions are standarized and depen… Continue reading Evaluating security controls of smaller vendors