Star 0

Abstract

Every organization has either outsourced part of their environment or is considering it to save money. This presentation will present to you the steps necessary to ensure 3rd parties are following the same security methodology required by your organization. Real examples will be provided on Request for Proposal's, contracts and reporting.