What’s your “hot take” when it comes to security questionnaires?

3.4k viewscircle icon2 Upvotescircle icon7 Comments
Sort by:
VP of IT in Real Estate6 hours ago

I like the idea of a "common" security questionaire so that a company only needs to fill out one and then can share it with anyone asking. Then only deal with anything non-standard. Something like: https://sharedassessments.org/sig/. Next thought is that a service like Blackkite gets you to a very rapid understanding of a vendor's risks without having to do the back and forth on questions.

CIO4 days ago

SOC2 compliance, PCI compliance and Incident Response SLAs

VP of Information Security20 days ago

It amazes me that security questionnaires are still seen as a key component of vendor due diligence. Most of the time this is a checkbox compliance exercise. I rarely see meaningful follow-up to responses that are clearly high-risk and I can say that as someone who has sat on both sides.

Companies know how to answer these questionnaires to pass compliance knowing full well that if the requester dug any deeper they would fail.

Do not let this be your own process in checking compliance. Ask for evidence and follow-up on answers. Don't let completing a questionnaires be your only due diligence.

CISOa month ago

We know that they are lying, they know that they are lying, they even know that we know they are lying, we also know that they know we know they are lying too, they of course know that we certainly know they know we know they are lying too as well, but they are still lying.

Lightbulb on2
Director of Cyber Engineering in Healthcare and Biotecha month ago

My "hot take" on security questionnaires is that while they’re a useful starting point, it’s vital not to depend solely on any single document. Always look for certifications, audit reports like SOC2, and other third-party assurances to confirm your security posture. Check if the organization already has a completed questionnaire to avoid duplication and save time. It’s crucial to incorporate your specific security requirements directly into the agreement, especially for non-regulated industries. For regulated industries, ensure you include a formal compliance statement and a requirement for proof of compliance. Ultimately, create a customized set of questionnaires and assessments based on the nature of the services, data sensitivity, and level of access involved—this detailed approach more effectively manages risk and clarifies expectations.

Lightbulb on1

Content you might like

Yes55%

No, but we're actively working to establish one31%

No14%

Unsure

View Results

Much more time9%

A bit more time66%

No change15%

A bit less time5%

Much less time3%

Hard to say at this time

View Results