Healthcare Vendor Breach: Credit Card System Hacked
Phase 4 of VRM: Risk Treatment
Phase 3 of VRM: Assessment
Phase 2 of VRM: Classification
Phase 1 of VRM: Inventory
Do You Need a Vendor Risk Management Program?
Deviating from Information Security Recommendations
Learning from Target's Vendor Risk Mistakes
Vendor Security Risk: Simplify, Standardize and Defend