Latest Report: The 2022 Gartner® Market Guide for IT Vendor Risk Management Solutions
“The single biggest problem in communication is the illusion that it has taken place.” – George Bernard Shaw
When your business is in the midst of a crisis, efficient communications can mean the difference between maintaining (relatively) smooth operations and perpetuating disruptions for your employees, customers and partners. We therefore created a customizable Escalation Paths Template to help you facilitate efficient communications regarding incident statuses, recovery plans and more.
This escalation paths template is part of a set of free resources designed to help organizations establish more consistent policies for supply chain resilience – so we’ll better prepared for the next disruption when we emerge from the coronavirus crisis
The customizable Escalation Paths Template includes guidance for outlining:
Use this template to centralize your critical contact information – both internal and external – and to define clear ownership for communications when things go awry.
> Download the free template to define your calling tree
Our pandemic planning resources are distributed weekly and can be freely modified to reflect your unique needs. The templates incorporate best-practice baselines across industries, and therefore can be integrated with any other risk assessment content you may be using.
Here’s what’s been published already, and what’s coming:
The coronavirus crisis is likely presenting you with unprecedented challenges – both personal and professional. We hope these templates makes your job a little bit easier in the face of this crisis. Once the dust settles, keep in mind that Prevalent also offers a free, one-hour third-party risk management program maturity consulting session. In the meantime, everyone at Prevalent wishes good health to you, your team, and your families.
If vendor threats and regulations are leaving your team feeling overwhelmed, then consider these benefits of...
Follow these 7 steps for more secure and efficient offboarding when third-party relationships are terminated.
Learn strategies for mitigating risks stemming from cyberattacks against your IT vendors.