Build a Vendor Security Assessment Service
Use a risk-based approach to right-size your vendor security assessments.
If you're already a member, click here to log in.
Major Business Pain Points

Recommendations
Key Points
Approach

Methodology and Tools
Executive Brief
Read the concise Executive Brief to find out why you should build a vendor security assessment service and review the methodology.
1. Define governance and process
Determine your business requirements and build your process to meet them.

Vendor Security Process Diagram (Visio)
2. Develop assessment methodology
Develop the specific procedures and tools required to assess vendor risk.
3. Deploy and monitor process
Implement the process and develop metrics to measure effectiveness.
The Vendor Security Risk Assessment Service methodology and tools are available to members of the Cyber Leadership Hub. Enter your details below to sign up for free membership of the Hub and download these resources.
If you're already a member, click here to log in or just download all content.
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.