SPRING DISCOUNT
Get 30% off on toolkits, course exams, and Conformio yearly plans.
Limited-time offer – ends April 25, 2024
Use promo code:
SPRING30

Expert Advice Community

Guest

Risks posed by third party’s or suppliers

  Quote
Guest
Guest user Created:   Dec 28, 2020 Last commented:   Dec 30, 2020

Risks posed by third party’s or suppliers

Please what are the risks posed by third party’s or suppliers? I mean examples of Information Security risks that are posed by third parties i.e. suppliers, partners and customers, for example, hardware devices such as routers, switches, telecom lines, firewalls, software applications, ICT services such as risk assessment, penetration testing, computer forensics investigations, etc,
1 0

Assign topic to the user

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

ISO 27001 DOCUMENTATION TOOLKIT

Step-by-step implementation for smaller companies.

Expert
Dejan Kosutic Dec 30, 2020

Different types of suppliers will have very different risks - e.g. with providers of telecom equipment you will have the risks of equipment breakdown, eavesdropping, etc.; with providers of specialized security services you will have the risk of unauthorized access to sensitive data, unauthorized change of sensitive data, industrial espionage, etc. 

To learn more about handling third parties and related risks, see these materials: 

This online course will also teach you about handling third-party risks: ISO 27001 Foundations Course https://advisera.com/training/iso-27001-foundations-course/ 

Quote
0 0

Comment as guest or Sign in

HTML tags are not allowed

Dec 28, 2020

Dec 30, 2020