This training program will highlight why a vendor questionnaire is the keystone your vendor management program is built on. The course will help ensure attendees get the whole picture and determine appropriate controls for information security and privacy.
In this interactive live webinar, find out the questions you need to ask to get a full picture of your provider. Attendees will learn things about vendors that they never knew before and what new risks it poses to their business.
Why Should You Attend:
A solid vendor management program is only as good as the information gathered from providers. Every vendor relationship creates risk for your enterprise. Some risks are readily apparent, others are hidden from view. Make sure that you ask the right questions of your providers to adequately assess the risks that you inherit from the relationship. Make certain that you have answers to the questions that regulators present. You can outsource the service, but not the responsibility.In this interactive live webinar, find out the questions you need to ask to get a full picture of your provider. Attendees will learn things about vendors that they never knew before and what new risks it poses to their business.
Learning Objectives:
- Know the questions you need to ask existing and potential vendors.
- Uncovering hidden risks from vendors.
- Determine appropriate controls for information security and privacy.
- Determining if a provider is considered high risk by federal regulators.
- Discover and review any current or past litigation that could affect performance or reputation.
- Gather accurate insurance information, certificates, coverage and providers.
- Learn the four basic steps needed for compliance with the FCRA.
- Learn how to spot fraudulent employment and education credentials.
Areas Covered in the Webinar:
- Important queries to provide the best vendor data possible.
- Getting to know the vendor’s leadership.
- Finding key personnel changes that may introduce risk.
- Conducting research of vendor’s history.
- Monitoring vendor activities using social and web tools.
- Ensuring that the vendor has succession and business continuity plans.
- Find out about vendors and determining risk from those providers.
- Discover third party access to your data and any agreements thereof.
- Getting references and following up.
- Making sure that, who answers, has binding authority.
Who Will Benefit:
- Compliance professionals
- Information security officers
- Security professionals
- Chief information officers
- Chief information security officers
- Executive management
- Individuals involved with managing outsourced relationships
- Enterprise risk managers
- Risk officers
- Vendor relationship supervisors
Course Provider
Michael D King,