Quiz: Cyber-risk through 3rd party vendors
1. Which of the following is not considered a third party?
*
1. Which of the following is not considered a third party?
2. Which of the following is not a typical vendor security question?
*
2. Which of the following is not a typical vendor security question?
3. Why is third party cyber risk important?
*
3. Why is third party cyber risk important?
4. You have narrowed down to 2 choices of a third party vendor to work with. How would you make the selection if you are concerned about security?
*
4. You have narrowed down to 2 choices of a third party vendor to work with. How would you make the selection if you are concerned about security?
5. What should you do if your third party vendor informs you of a breach that has occurred in their systems?
*
5. What should you do if your third party vendor informs you of a breach that has occurred in their systems?
6. You have shortlisted 3 third party vendors to help with a scope of work that involves critical customer data and shared your company’s Technology & Risk Management (TRM) documentation with them. The vendors are requesting over 3 weeks of time to answer whether or not they comply with everything in your TRM but your project is urgent and you need to select a vendor and get them to start work by this week. What should you do?
*
6. You have shortlisted 3 third party vendors to help with a scope of work that involves critical customer data and shared your company’s Technology & Risk Management (TRM) documentation with them. The vendors are requesting over 3 weeks of time to answer whether or not they comply with everything in your TRM but your project is urgent and you need to select a vendor and get them to start work by this week. What should you do?
7. What are the most common reasons for third party breaches?
*
7. What are the most common reasons for third party breaches?
8. What is an example of privilege misuse?
*
8. What is an example of privilege misuse?
9. What are the main components of costs in a data breach?
*
9. What are the main components of costs in a data breach?
10. Which of the following specify a way of calculating the costs of a data breach?
*
10. Which of the following specify a way of calculating the costs of a data breach?