Each of our regulators say this in a similar way, we must understand the security controls of a third party “to the same extent” as we understand our own internal controls. This is challenging, as some of our vendors share few details about controls. Our industry currently relies heavily on the new SSAE18 Audit Report and the Service Organization Control (SOC)2 reports provided by vendors. What are the differences between these two reports and which should we be requesting? And once we obtain them, how do we understand the security controls to the “same extent” as our own?
We will explore the different types of SOC reports provided by vendors and highlight the best items that should be requested from vendors. Each of these report serves a different purpose and will provide different value to your institution. In addition to what reports to ask for, we will explore them in detail to highlight what to look for and how to fill in the gaps, to ensure your understanding security to the “same extent”.
- Third Party Management best practices
- Updated Regulatory Expectations
- SSAE16 vs SSAE18 standard changes
- SOC1, SOC2, SOC3 Audits
- SOC Reports Type 1 and Type 2
- Detailed due diligence and contract questions
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CFO, and Executives looking to understand the risk around Vendor Management.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.