Vendor Sourcing and Management: Is Your Data Secure?
This IDC study is designed for CIOs and VSMO leaders to enable them to work closely with vendors to improve security preparedness for cyberattacks and information breaches. This study discusses the importance of CIOs working in collaboration with key vendors to define an information security plan and a breach protocol. This study:Describes the major vendor cybersecurity issuesDescribes how to evaluate and verify vendor security qualificationsDescribes how to handle an information breach with a vendorHighlights the importance of the VSMO in information security"More CIOs rely on external vendors for 3rd Platform services and digital transformation while the frequency of information security breaches continues to grow," says Ron Babin, adjunct analyst with IDC's Research Network. "As a result, it has become increasingly important to work closely with vendors to anticipate, prevent, and react to security breaches, within the context of the broader vendor sourcing and management framework."
Please Note: Extended description available upon request.
Learn how to effectively navigate the market research process to help guide your organization on the journey to success.Download eBook