Main Nav

Friday
Oct 21st, 2011
9:30 AM - 10:20 AM
Meeting Room 113B/C
Eastern Time
Institutions are increasingly gaining efficiencies and reducing costs by using third parties to host institution-owned data. How do we assess incremental risk of this approach? How can we ensure adequate security practices exist before finalizing contractual agreements? This session will introduce a general strategy and several tools for prequalifying and auditing third parties.
Media
Speakers
Resources

Comments

Thoughts #E11_SESS144 - Vendors make up self-certification that in depth don't mean a secure environment. Don't base trust off a xls #edu11

Make sure vendors include security requirements in their SAS-70 reports (or SSAE-16) #accountantsaregeekstoo #EDU11 #E11_SESS144


Comments

Thoughts #E11_SESS144 - Vendors make up self-certification that in depth don't mean a secure environment. Don't base trust off a xls #edu11

Make sure vendors include security requirements in their SAS-70 reports (or SSAE-16) #accountantsaregeekstoo #EDU11 #E11_SESS144