All Blogs
Showing 1-9 of 12
Incident Response & Recovery
Key Takeaways From the Snowflake Security Incidents
June 5, 2024
Gain an understanding of the Snowflake Security Incidents. Find analysis and guidance to be ready to respond should a systemic Snowflake incident be identified that impacts your data.
Jake Williams, IANS Faculty
Managing Vendors and Third Parties
The Role of SBOMs, Segmentation, and Access Controls in Supply Chain Security
February 7, 2024
Discover the role of SBOMs, segmentation, and access control in strengthening your supply chain security. Learn more from IANS faculty.
Josh Marpet, IANS Faculty
Managing Vendors and Third Parties
A Guide to Vendor Monitoring for Risk Mitigation
April 13, 2023
Learn how to build a vendor monitoring that adds value and focuses squarely on mitigating business risk. Discover tips and considerations from IANS faculty.
IANS Faculty
Managing Vendors and Third Parties
Tips for Vetting Vendors’ Usage of Cloud Services
February 2, 2023
Learn how to reduce vendor risk in shared cloud platforms and find tips to close the security gap between the CSP and third parties.
IANS Faculty
Managing Vendors and Third Parties
6 Vendor Risk Management Best Practices
December 1, 2022
Improve your vendor risk management program using six best practices to benchmark program maturity and identify key pitfalls to continuously avoid.
IANS Faculty
Managing Vendors and Third Parties
Building a Third-Party Risk Management Checklist
March 29, 2022
Guidance for third-party risk management to build a best practices checklist and comprehensively manage organizational risk across all external service providers.
IANS Faculty
Managing Vendors and Third Parties
How to Build a Third-Party Risk Management Framework
March 24, 2022
Learn the steps information security teams must take to build a solid third-party risk management framework that mitigates organizational third-party risk.
IANS Faculty
Managing Vendors and Third Parties
The Importance of Supplier Continuity Exercises
September 7, 2021
Learn how businesses can identify their most critical suppliers and then verify their continuity capabilities through an independent validation of the supplier’s continuity plans and ongoing exercises to ensure the businesses and supplier resilience efforts are coordinated.
IANS Faculty
Managing Vendors and Third Parties
Best Practices for Secure and Effective Third-Party PoCs
August 19, 2021
Understand how to balance the needs of the business and security by establishing policies, procedures and resources for a secure and effective third-party proofs of concept (PoCs).
IANS Faculty
We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Policy.