Remove Disaster Recovery Remove Risk Assessment Remove Third Party Vendors
article thumbnail

Keeping Third-Party Risk First On The Cybersecurity (Risk) List

PYMNTS

With the changing roles and demands tied to security, she said, efforts are going well beyond the questionnaires sent out to third-party vendors querying about the controls that they may have in place — in effect “going from ‘trust’ to ‘verify,’” as she put it, with even on-site, independent assessments an increasing occurrence.