{"id":5379,"date":"2021-09-07T10:39:56","date_gmt":"2021-09-07T10:39:56","guid":{"rendered":"https:\/\/datasecc.com\/?page_id=5379"},"modified":"2021-09-07T10:44:59","modified_gmt":"2021-09-07T10:44:59","slug":"supplier-audit","status":"publish","type":"page","link":"https:\/\/datasecc.com\/?page_id=5379","title":{"rendered":"Supplier Audit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5379\" class=\"elementor elementor-5379\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-184413a3 elementor-section-content-middle ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"184413a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7a9e5ff1 ot-flex-column-vertical\" data-id=\"7a9e5ff1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1a6a5e69 elementor-widget elementor-widget-iheading\" data-id=\"1a6a5e69\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"iheading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-heading\">\r\n\t        \t            <span>\/\/ SUPPLIER AUDIT<\/span>\r\n\t        <h2 class=\"main-heading\">How Secure Are Your Third-Party Relationships?<\/h2>\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ec84871 elementor-widget elementor-widget-text-editor\" data-id=\"2ec84871\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>With increased regulatory scrutiny, continuing cost pressures, active investors, and a vigilant public, it\u2019s important to have a clear understanding of the inherent risks that come with external business relationships.<\/p><p>By proactively addressing third-party issues, you can reduce your organization\u2019s exposure to risk while achieving stronger relationships with service providers. When assessing third-party relationships, it\u2019s critical to have a strong understanding of how the desired benefits \u2013 whether improved agility, increased performance, or cost savings \u2013 could be weakened by unforeseen vulnerabilities<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-235ce53d ot-flex-column-vertical\" data-id=\"235ce53d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-68d3f65 elementor-widget elementor-widget-image\" data-id=\"68d3f65\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"529\" src=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/supplier-audit-e1567409961936-768x529-1.jpg\" class=\"attachment-large size-large wp-image-2114\" alt=\"\" srcset=\"https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/supplier-audit-e1567409961936-768x529-1.jpg 768w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/supplier-audit-e1567409961936-768x529-1-300x207.jpg 300w, https:\/\/datasecc.com\/wp-content\/uploads\/2021\/09\/supplier-audit-e1567409961936-768x529-1-720x496.jpg 720w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-153853a0 ot-traditional elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"153853a0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3a9864c1 ot-flex-column-vertical\" data-id=\"3a9864c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-13b12111 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"13b12111\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-27daeaf3 ot-flex-column-vertical\" data-id=\"27daeaf3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70114721 elementor-widget elementor-widget-heading\" data-id=\"70114721\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Our Approach<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4284975b elementor-widget elementor-widget-text-editor\" data-id=\"4284975b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Initially, we work to understand what information assets will be maintained by external parties and the value of them from a legal or contractual and IP perspective.<\/p><p>This understanding is used to amend our Supplier Audit Framework to evaluate suppliers based on scoped information and protection required.<\/p><p>Following a response from your supplier, we evaluate the maturity of controls implemented by third-party suppliers and inherent risk. Results of analysis are<br \/>delivered to you via a written report, thus arming you with the right information about your third-party relationships.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a9c0e8 elementor-widget elementor-widget-spacer\" data-id=\"7a9c0e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5a349d5 elementor-section-full_width ot-traditional elementor-section-height-default elementor-section-height-default\" data-id=\"5a349d5\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-fecb489 ot-flex-column-vertical\" data-id=\"fecb489\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89a8c45 elementor-widget elementor-widget-heading\" data-id=\"89a8c45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Our Promise of Value<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dd31755 elementor-widget elementor-widget-text-editor\" data-id=\"dd31755\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Seasoned business-minded security consultants with 10 years\u2019 experience delivering over a hundred supplier audits<\/li><li>Business-driven Supplier Audit Framework<\/li><li>Commitment to collaborating closely with clients on security solutions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e173a96 elementor-widget elementor-widget-ibutton\" data-id=\"e173a96\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"ibutton.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"ot-button\">\r\n\t\t\t<a href=\"#\" class=\"btn-details\"><i class=\"flaticon-right-arrow-1\"><\/i> LEARN MORE<\/a>\r\n\t    <\/div>\r\n\t    \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\/\/ SUPPLIER AUDIT How Secure Are Your Third-Party Relationships? With increased regulatory scrutiny, continuing cost pressures, active investors, and a vigilant public, it\u2019s important to have a clear understanding of the inherent risks that come with external business relationships. By proactively addressing third-party issues, you can reduce your organization\u2019s exposure to risk while achieving stronger [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5379","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5379"}],"version-history":[{"count":4,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5379\/revisions"}],"predecessor-version":[{"id":5383,"href":"https:\/\/datasecc.com\/index.php?rest_route=\/wp\/v2\/pages\/5379\/revisions\/5383"}],"wp:attachment":[{"href":"https:\/\/datasecc.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}