Securing the Supply Chain: Best Practices when Evaluating Third Party Technology Acquisition presented at CornerstonesofTrust 2016

by Stuart Cianos,

Summary : Abstract: Now more than ever, it's important to have an understanding of the risks related to acquisition of new technologies as demonstrated by recent high profile breaches such as the 2015 Target attack. Best practices will be outlined when evaluating new technologies and vendors so that risks may be identified and managed prior to acquisition and implementation. Coverage will include vendor management throughout the process, data points to collect from potential vendors, and challenges/solutions from the field. Whether your organization runs a formal competitive acquisition process, prefers single-sourcing, or even maintains no centralized acquisition process at all -- security assessment of technology acquisitions is an important tool to help organizations gain better insights when implementing new systems procured from third parties.