Vendor Sourcing and Management: Is Your Data Secure?

Vendor Sourcing and Management: Is Your Data Secure?

This IDC study is designed for CIOs and VSMO leaders to enable them to work closely with vendors to improve security preparedness for cyberattacks and information breaches. This study discusses the importance of CIOs working in collaboration with key vendors to define an information security plan and a breach protocol. This study:Describes the major vendor cybersecurity issuesDescribes how to evaluate and verify vendor security qualificationsDescribes how to handle an information breach with a vendorHighlights the importance of the VSMO in information security"More CIOs rely on external vendors for 3rd Platform services and digital transformation while the frequency of information security breaches continues to grow," says Ron Babin, adjunct analyst with IDC's Research Network. "As a result, it has become increasingly important to work closely with vendors to anticipate, prevent, and react to security breaches, within the context of the broader vendor sourcing and management framework."

Please Note: Extended description available upon request.

IDC Opinion
In This Study
Situation Overview
VSM Cybersecurity Issues
Procurement — Evaluate and Verify Vendor Security Qualifications
Vendor Relationship Management: The Role of the Security Officer
How to Handle a Breach
Managing a Vendor Breach
Future Outlook
Essential Guidance
Learn More
Related Research
IT Executive Program Research Agenda

Download our eBook: How to Succeed Using Market Research

Learn how to effectively navigate the market research process to help guide your organization on the journey to success.

Download eBook