Working with third parties has plenty of benefits but can open your company up to the threat of data breaches and cyberattacks.
Help protect your organization with Third-Party Risk Management SIG Lite, an Application in Risk Cloud you can use to assess how any third party your company works with manages its security risks across 18 risk control areas.
The SIG Lite Application can be used to assess third parties for potential gaps in security processes and maintain your organization’s security posture. It creates findings, identifies impacts, and tracks associated resolution plans through to completion.
This Application uses the SIG Lite assessment, which is a shortened version of the Standardized Information Gathering (SIG) Questionnaire developed by Shared Assessments to assess risk, cybersecurity frameworks, and industry-specific controls at third parties. The Application is designed to assign and complete forms from your organization’s third-party point of contact and, once an assessment is complete, each vendor is assigned a rating in accordance with the percentage of SIG Lite controls in place.