Cybersecurity Assessment Methods
Standardizing Cybersecurity Third-Party Assessment Methodologies
If you've been in the cybersecurity industry for long enough, you'll likely be brought into doing some form of assessment. This may range from a simple Third-Party Risk Management (TRPM) all the way to a Merger, Acquisition or Divestiture (MA&D) activity. The fun part generally comes down to establishing the basis for the assessment, since there is often no standard that the team is working off of. This lack of standardization makes having a mature and repeatable process nearly impossible.
These free guides are specific to how to perform a third-party cybersecurity assessment, as well as how to do the cybersecurity side of MA&D due diligence activities.