cognitive cybersecurity intelligence

News and Analysis

Search

How To Vet a Provider’s Cybersecurity Processes

Audits of third-party providers conducted under the Service Organization Control Type 2 (SOC 2) framework are a key tool for firms to verify the cybersecurity systems of vendors and providers, according to a panel at CIO’s recent livestream event. Such audits can reveal the effectiveness of a company’s internal controls and show how well it protects customer data. The panel also stressed that cybersecurity insurance is crucial, but complex, and thus requires advice from knowledgeable brokers.

Source: www.ai-cio.com –

Subscribe to newsletter

Subscribe to HEAL Security Dispatch for the latest healthcare cybersecurity news and analysis.

More Posts