…CONTINUED
What is the role of cybersecurity in contracts with third-party support vendors and crucial suppliers.
Have you discussed these types of concerns and risks with them?
What mechanisms and products are used to share cyber threat information within your organization and external to your organization (e.g. distribution lists, information sharing portals, broadcast messaging)?
Made with FlippingBook - Online catalogs