• Skip to main content
  • Skip to primary sidebar

Information Security Management ResourceKit

A Public Service of SecureTheVillage

  • Home
  • Return to SecureTheVillage

Third-Party Security Management

SecureTheVillage Webinar: Third-Party Security Management

Webinar: Third-Party Security Management

Webinar Deck (PDF): Third-Party Security Management

December 6, 2018: Stan’s Guest: John Coleman, EVP Information Technology, Pacific Premier Bank

ResourceKit Articles

  • Third-Party Security Management Basic Requirements - The Information Security Manager (ISM) is to manage the information security risk associated with the sharing of sensitive information with third-parties by Maintaining a documented plan for managing 3rd-party risk Providing third-parties with information security requirements, including applicable legal and contractual requirements Gaining contractual assurance from third-parties that they commit to following information security requirements Providing guidance […]

Primary Sidebar

Resources Areas

  • Cyber Threats
    • Ransomware
    • Online Bank Fraud
  • Information Security Management / Leadership
  • Information Security Policies and Standards
  • Information Security Risk Assessment
  • Information Classification and Control
  • Securing the Human
  • Third-Party Security Management
  • Managing Security of the IT Infrastructure
  • Legal & Related
    • Basic Cyber Laws
    • Payment Card Industry Data Security Standard (PCI DSS)
    • General Data Protection Regulation (GDPR)
    • California Consumer Privacy Act (CCPA)
    • Cybersecurity Maturity Model Certification (CMMC)
  • Getting Cyber-Prepared: Incident Response & Business Continuity
  • Managing Cyber-Risk and Insurance
  • Personal Cybersecurity
  • Cyber Freedom

Copyright © 2023 · SecureTheVillage