CISM: Governance of Third-party Relationships

From Glitchdata
Jump to navigation Jump to search
  • Offshore provider might have cultural differences
    • Individuals in different cultures often have a different perspective on what information is considered sensitive.
  • Technical skills (common scope)
  • Information security policies (common scope)
  • Defence-in-Depth provides controls design and operational effectiveness meets standards (common scope)