CISM: Governance of Third-party Relationships
Jump to navigation
Jump to search
- Offshore provider might have cultural differences
- Individuals in different cultures often have a different perspective on what information is considered sensitive.
- Technical skills (common scope)
- Information security policies (common scope)
- Defence-in-Depth provides controls design and operational effectiveness meets standards (common scope)