Vendor Threshold Analysis
Vendor Risk Assessment
Sort your vendors by Inherent Risk, then perform the due diligence.
The level of scrutiny we apply to a vendor depends on the inherent risk exposure they raise. Because of this, we need to have a method of quickly analyzing inherent risk, based on several factors including:
- Possession of Information
- Access to Information
- Business Continuity Impact
- Financial Risk
The Threshold Analysis is a document meant to help you achieve the above goals and lay a papertrail that demonstrates your thought process.
All templates are color-coded, updates are free for three years and our boilerplates all come with a 30-day guarantee!
Save when you purchase the entire Vendor Management Program!
Leave a comment
Voice assistants can be helpful, but their “always on” functionality can leave you vu Read more
Previously thought to be designed to deliver a DDoS attack, VPNFilter can alter data Read more
Getting a message to the user is one thing, having them see it is another… An article Read more
US Cyber Command joins with the FS-ISAC to share threat intelligence… An article revi Read more