All regulators say, in a similar fashion, that we must understand the security controls of a third party “to the same extent” as we understand our own internal controls. Doing so can be challenging, as some of our vendors share few details about controls. Most industries rely heavily on the new SSAE18 Audit Report and the Service Organization Control (SOC)2 reports provided by vendors. What are the differences between these different reports, and which should we be requesting? And once we obtain them, how do we understand the security controls to the “same extent” as our own?
We will explore the different types of SOC reports provided by vendors and highlight the best items that should be requested from vendors. Each of these reports serves a different purpose and will provide different value to your institution. In addition to what reports to ask for, we will explore them in detail to highlight what to look for and how to fill in the gaps to ensure your understanding security to the “same extent”.
- Vendor Management Regulatory Expectations
- Third Party (Vendor) Management best practices
- Fourth Party/Supply Chain Management
- Required Documentation, including the different SOC Report types
- Other items useful in Vendor reviews
- Detailed Due Diligence and Contract Review questions
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, CFO, and Executives looking to understand the risk around Vendor Management.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.