Integrating procurement procedures to complete third-party security | RiskXchange |
Posted: September 7, 2021 |
Today, procurement is the bedrock on which many organisations operate. In an era of comparative advantage, business survival hinges on our cooperation with external parties that streamline the work we do. What’s equally true is that these networks have become the target of sophisticated and evolving cyberattacks. This has meant that our approach to third-party cybersecurity requires a much-needed upgrade—one in which procurement sits entirely within our third-party security strategies.
|
|||||||||||||||||||||||||||||||||||||||||||
|