Not specifically to a single breach (we've all had them), but we do need to manage the risk associated with a supplier that does not perform consistently with safeguarding our sensitive information. We had definitely taken action against a supplier that has had an historical pattern of poor cyber hygiene and/or insufficient prioritization of protecting our sensitive data, identity, and/or accesses.
What are some best practices to follow when your organization is preparing to end a vendor relationship? What can you do to minimize the operational disruption that would result?
What sets us apart?
No selling.
No recruiting.
No self promotion.
Read Our GuidelinesTrusted peer advice and insights for technology professionals.
Not specifically to a single breach (we've all had them), but we do need to manage the risk associated with a supplier that does not perform consistently with safeguarding our sensitive information. We had definitely taken action against a supplier that has had an historical pattern of poor cyber hygiene and/or insufficient prioritization of protecting our sensitive data, identity, and/or accesses.