Third-Party Risk Management SIG Lite Application

Third-Party Risk Management

Assess and manage vendor security risks

Get started now

Working with third parties has plenty of benefits but can open your company up to the threat of data breaches and cyberattacks.

Help protect your organization with Third-Party Risk Management SIG Lite, an Application in Risk Cloud you can use to assess how any third party your company works with manages its security risks across 18 risk control areas.

How It Works

The SIG Lite Application can be used to assess third parties for potential gaps in security processes and maintain your organization’s security posture. It creates findings, identifies impacts, and tracks associated resolution plans through to completion.

This Application uses the SIG Lite assessment, which is a shortened version of the Standardized Information Gathering (SIG) Questionnaire developed by Shared Assessments to assess risk, cybersecurity frameworks, and industry-specific controls at third parties. The Application is designed to assign and complete forms from your organization’s third-party point of contact and, once an assessment is complete, each vendor is assigned a rating in accordance with the percentage of SIG Lite controls in place.

Why You Need It

  • Evaluate your third-parties’ risk controls with the SIG Lite Business Information Worksheet, Documentation and Artifacts Request List, and all questions from the 2021 SIG Lite Questionnaire
  • Assess your vendor’s cybersecurity, IT, privacy, data security, and business resiliency
  • Get access to customizable, pre-built workflows for organizing and storing vendor information and assessments

Learn more about the SIG Lite Application

Publisher: LogicGate

Date Added: 11/12/2020

Type: Applications


Share

Find out how LogicGate made Gartner’s 2020 Magic Quadrant for IT Vendor Risk Management