Latest Report: The Gartner® Market Guide for IT Vendor Risk Management Solutions
Organizations that typically don’t have employees working from home are facing a new reality as a result of the pandemic: Potentially inconsistent or incomplete policies that could lead to unintended security consequences. In the wake of recent breaches like GE, Chubb and Marriott it’s ever-more important to ensure employees are trained to address security risks when they’re operating without the protection of their corporate networks or physical security.
As part of our initiative to provide complimentary best practices guidance during the COVID-19 pandemic, we created a free kit containing a remote working policy template and an employee training presentation. You can use it to quickly publish best practices security guidance to your internal teams.
In the Remote Working Policy & Employee Training Kit, you’ll find:
Our pandemic planning resources are distributed regularly and can be freely modified to reflect your unique needs. The templates incorporate best-practice baselines across industries, and therefore can be integrated with any other risk assessment content you may be using.
Here’s what’s been published already:
And here's what's coming next:
Ensuring that your own internal security practices are in line with those of industry regulations and frameworks demonstrates your organization’s agility in dealing with crises, and will help address requirements in any risk assessment you are asked to complete.
The coronavirus crisis is likely presenting you with unprecedented challenges – both personal and professional. We hope these templates makes your job a little bit easier in the face of this crisis. Once the dust settles, keep in mind that Prevalent also offers a free, one-hour third-party risk management program maturity consulting session. In the meantime, everyone at Prevalent wishes good health to you, your team, and your families.
If vendor threats and regulations are leaving your team feeling overwhelmed, then consider these benefits of...
Follow these 7 steps for more secure and efficient offboarding when third-party relationships are terminated.
Learn strategies for mitigating risks stemming from cyberattacks against your IT vendors.