From the course: IT Vendor Management in Practice
Unlock the full course today
Join today to access over 25,200 courses taught by industry experts.
Risk management
From the course: IT Vendor Management in Practice
Risk management
- [Instructor] The two roles at Red30 Tech primarily involved in IT vendor risk and security management are the IT risk manager and the IT security liaison. They work to make risk visible to all governance levels and to manage them with proper action plans. Rachel, the risk manager, analyzes the vendor's failure to deliver the 400 PCs within their committed SLA and finds that one of the key contributing factors is that there is little or no demand forecasting being performed by RedTech 30's IT endpoint management team. Sarah Chen works to reduce and eliminate IT security risks with vendors in their products, services, and practices. This includes cybersecurity vulnerabilities, data breaches, third-party dependencies, insider threats, non-compliance issues, and inadequate access controls, security measures, and incident response capabilities. Rachel and Sarah work to achieve an acceptable level of risk, knowing that they can't eliminate every risk and that trying to do so would be a…
Contents
-
-
-
-
(Locked)
Vendor identification and selection3m 16s
-
(Locked)
Contract negotiation and management2m 46s
-
(Locked)
Performance monitoring and measurement2m 42s
-
(Locked)
Performance reviews and reporting2m 38s
-
(Locked)
Relationship management2m 37s
-
(Locked)
Risk management3m
-
(Locked)
Compliance management2m 29s
-
(Locked)
Financial management2m 4s
-
(Locked)
Change management4m 16s
-
(Locked)
Continuous improvement3m 32s
-
(Locked)
-
-