How safe is your data after it leaves your control? Howard Haile Bill McSpadden. IT Vendor Assessments. Topics Covered. Why conduct a vendor audit? Organizing the internal processes Identifying who needs to be involved Get information about your vendors
How safe is your data after it leaves your control?
Develop standards and procedures surrounding data
Make sure it covers
Vendor management (purchasing, etc.)
NOTE: same assessment process needs to be followed for the 3rd party
If you are provide outsourced services: