Could someone provide insights on the latest industry trends and best practices for incorporating information security provisions in contracts with third-party vendors and suppliers, including cloud service providers, especially when our company shares sensitive data?  Also, if there are any process improvement ideas for contract reviews, that would also be helpful.  Thank you.

821 views1 Upvote4 Comments
Sort By:
Oldest
Manager, Cybersecurity in Travel and Hospitalitya month ago
I would highlight data handling and destruction policies, strict SLA’s, automated contract review alerts. For cloud, especially for cloud adopting CSA STAR is good one to consider for your requirements.
2 2 Replies
Information Security Analyst in Healthcare and Biotecha month ago

Thank you Pradeep Reddy Sama.

1
Manager, Cybersecurity in Travel and Hospitalitya month ago

Happy to have conversations around the TPRM topic anytime.

lock icon

Please join or sign in to view more content.

By joining the Peer Community, you'll get:

  • Peer Discussions and Polls
  • One-Minute Insights
  • Connect with like-minded individuals
Senior Manager in Softwarea month ago
First, specify security requirements like encryption standards, access controls and incident response. Include clauses for compliance with relevant regulations and regular security assessments or audits. It's also crucial to add a data breach notification clause that outlines how quickly vendors must inform you of breaches and their mitigation steps. For contract reviews, create a standardized checklist for security provisions to streamline the process and ensure consistency. Involving your legal and IT security teams early can help identify potential issues.

Content you might like

1.6k views1 Upvote

Company financial stability57%

Industry trends45%

Length of time in business43%

Recent layoffs or restructuring47%

Employee turnover rate46%

Compensation38%

Culture46%

Blindly following Review sites (eg. GlassDoor)5%

Other(s)2%

View Results
17.7k views7 Upvotes2 Comments
Sr. Manager, Enterprise Architecture in Media9 months ago
Building a story around what zero-trust is and what solutions are used to achieve zero-trust security goals. Then, educate the organization to bring awareness. 
2 1 Reply
Read More Comments
53.2k views5 Upvotes33 Comments

Yes, specifically TikTok25%

Yes, specifically, but not only TikTok50%

No20%

Don’t know…3%

View Results
23.6k views1 Upvote2 Comments