Time: 11:00am-1:00pm Eastern Time
All regulators say, in a similar fashion, that we must understand the security controls of a third party “to the same extent” as we understand our own internal controls. Doing so can be challenging, as some of our vendors share few details about controls. Most industries rely heavily on the new SSAE18 Audit Report and the Service Organization Control (SOC)2 reports provided by vendors. What are the differences between these different reports, and which should we be requesting? And once we obtain them, how do we understand the security controls to the “same extent” as our own?
We will explore the different types of SOC reports provided by vendors and highlight the best items that should be requested from vendors. Each of these reports serves a different purpose and will provide different value to your institution. In addition to what reports to ask for, we will explore them in detail to highlight what to look for and how to fill in the gaps to ensure your understanding security to the ‘same extent’.
- Vendor Management Regulatory Expectations
- Third Party (Vendor) Management best practices
- Fourth Party/Supply Chain Management
- Required Documentation, including the different SOC Report types
- Other items useful in Vendor reviews
- Detailed Due Diligence and Contract Review questions
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CFO, and Executives looking to understand the risk around Vendor Management.
Continuing Education (CE) Credits
This webinar is recommended for 2.5 CE Credit Hours. Each attendee will receive a Certificate of Attendance for self-reporting of CE Credits.View Delivery Options