You've requested...

Vendor risk management: Assessing your vendors' security and compliance

If a new window did not open, click here to view this asset.

Download this next:

Improve risk management by connecting business & IT

Organisations that invest in resilience during times of uncertainty are better able to seize opportunity when it arises. In this eBook, discover how you can optimise operations, reduce costs and risk and boost resilience by connecting business and IT on a single platform. Learn more about Integrated Risk Management from ServiceNow in this ebook.

These are also closely related to: "Vendor risk management: Assessing your vendors' security and compliance"

  • Risk management: 5 stages to compliance

    Maturing your risk management program is vital for meeting enterprise-wide objectives. Get insights on how you can raise the maturity level of enterprise risk management. You’ll discover how your teams can make better decisions that lead to greater outcomes, by connecting business and IT with a common language on a single platform.

  • Aligning risk & service models for operational resilience

    This whitepaper outlines aligning your entity hierarchy with CMDB and CSDM for effective risk management. It details four maturity levels—tactical to resilient—broadening the risk scope. Learn to define entities, types, and classes for managing risk, with hierarchy examples from basic to complex. The paper shows how ServiceNow's Integrated Risk Management meets organizations at their maturity and helps progress to advanced risk sophistication. Read to build a robust framework aligned with business services and infrastructure.

Find more content like what you just read:

  • ServiceNow Security Operations: The essential use case guide

    The skills shortage and increasing cyberattacks continue to challenge security teams, slowing their responses to security incidents. To help teams avoid disaster, ServiceNow developed Security Operations and the Now Platform. Learn about how these solutions work in this guide.

    Download

  • Speeding up vulnerabilty detection with automation

    Almost half of all CIOs believe their cybersecurity may not be on par with their digital transformation efforts, but 80% of organizations that use automation say they can respond to vulnerabilities in a shorter timeframe. Download this white paper to help

    Download

  • 3 pillars for transforming risk & compliance management

    Enterprises have to overcome the current impedances to effective risk management: organizational silos, manual work, poor UX, and disparate systems. Read this paper to understand 3 pillars for evolving your compliance and risk management strategy, as well as a checklist for how ServiceNow can assist in this process.

    Download

  • How to accelerate your risk and compliance initiatives—and get to value faster

    Explore in this e-book some of the top risk and resilience management solutions available to your organization that can help you break silos, help embed risk and compliance management into daily work, and improve performance through risk-informed decisions.

    Download

  • Same cyberthreat, different story

    Organizations like yours are reducing the cost and chaos of vulnerability management by orchestrating an automated response across IT asset management, risk and security. Read this story for a real, practical example of how it's done, helping you stay ahead of the latest cyberthreats and drive continuous improvements.

    Download

  • CrowdStrike vs. Rapid7 vs. Tenable for risk-based vulnerability platforms

    Risk-based vulnerability management (RBVM) platforms were developed to help customers prioritize vulnerabilities. Read this IDC MarketScape report to compare 15 RBVM platforms—including CrowdStrike, Rapid7, Tenable, and Ivanti—to find the platform most suitable for your organization.

    Download

  • 5 tips for digital transformation success: Tackling digital risk

    Read Digital Transformation & Risk For Dummies, 2nd ServiceNow Special Edition to learn how you can manage and tackle digital risk with a single platform that unlocks a common language between business and IT.

    Download

  • Horizon Media: Spinning Up a Cyber Risk Program from Square One

    As a company grows, so does its responsibility for keeping its customers’ data and assets secure. But Horizon lacked a formal cyber risk management program, which made it hard to assure their clients that they were doing all they could to keep their information safe. So, they turned to LogicGate Risk Cloud.

    Download

  • 7 free GRC tools for compliance professionals

    All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.

    Download

  • Meet the GRC challenges of the cloud head-on

    Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.

    Download

  • How Your Next Technology Decision Could Impact Your ESG Goals

    The beginning of your ESG journey can feel daunting, but smart technology decisions can make the road much smoother. To get ahead of your sustainability goals, explore this ServiceNow guide to the top ESG trends and opportunities.

    Download

  • 12 top enterprise risk management trends in 2023

    Enterprise risk management has taken center stage as organizations grapple with the lingering effects of the COVID-19 pandemic, the threat of a recession and the rapid pace of change. Here are 12 security and risk management trends that are reshaping the risk landscape and influencing business continuity planning.

    Download

  • Trustwave as an MCSS provider: Strengths & challenges

    To secure their workloads, many businesses are turning to managed cloud security services (MCSS) providers. The popularity of such services led IDC to analyze the market for MCSS. Dig into this report for a breakdown of one of the 18 providers evaluated: Trustwave.

    Download

  • Enabling digital transformation safely & confidently

    Your business is forced to defend against actual cyberthreats and potential ones. So, how can you bolster your security stance in the face of all these risks? Check out this e-book to discover 10 ways that a cloud-based platform with an integrative approach can help you do so.

    Download

  • Top 3 issues for today’s security operations teams

    Discover how you can save over $4 million a year while building efficient security operations with ServiceNow. By giving security, risk management and IT teams total visibility of cyberthreats, you can contain cyberbreaches 85% faster and boost security analyst efficiency by 3x.

    Download

  • Compliance leader’s guide to policy adoption

    Adopting or qualifying for a compliance standard can be a complex process, but with the right guidance, you can achieve the benefits without the headache. This white paper presents you with 10 Mandatory policies that each company should put in place when they start their SOC 2, ISO 27001, or FEDRAMP journey. Read on to learn more.

    Download

  • 25 Questions Leaders Should Ask About the Use of AI For GRC

    The use of artificial intelligence (AI) in risk management is on the rise, enhancing efficiency and speed in ways that simply cannot be done with other tools. However, the associated risks of AI must be taken into consideration so that your organization can develop a strategy that supports long-term success and scalability. Read on to learn more.

    Download

  • Attack surface management buyer’s guide

    The evolution and adoption of new digital technologies has led to a rapid expansion of the attack surface. This Kuppingercole report aims to provide an overview of the attack surface management (ASM) market and give you a compass to help you to find the solution that best meets your needs. Read on to learn more.

    Download

  • Your roadmap for automating security processes

    Read this white paper to learn how you can transform your IT security operations and confidently support continuous digital transformation and innovation, with ServiceNow. You’ll discover how to save your IT security staff up to 8,700 hours a year while driving cyber resilience, with a single platform.

    Download

  • Are you merely tracking assets—or are you maximizing their full value?

    Read this e-book to see how you can automate your hardware asset management to maximize the value of your current technology investments and help your IT teams become a strategic business partner.

    Download

  • How to secure your ServiceNow SaaS

    Many organizations rely on ServiceNow to manage their IT systems. But with the inherent risks associated with SaaS deployment, organizations need to know how they can best secure their ServiceNow usage. This guide offers an overview of ServiceNow, helping you understand and secure the complex platform. Read on to learn more.

    Download

  • IT asset tracking: Why having all the data won't suffice

    Explore in this e-book the kind of data you need to see all your software, hardware, and cloud-based assets – as well as cloud resources that are often overlooked.

    Download

  • Dropbox Controls Spending with ServiceNow & Genpact

    Dropbox cut its procurement cycle time by over 50% by adopting ServiceNow and partnering with Genpact for consulting and implementation. Read this case study to see how this company replaced disconnected, manual processes with a streamlined, automated system providing transparency and efficiency.

    Download

  • Demystifying risk management

    Risk management refers to the practices and systems an organization employs to identify, monitor and remediate this risk. To shed light on risk management TechTarget has provided this article-guide, which will take you through the ins and out of risk management, as well as its importance for modern IT. Read on to learn more.

    Download

  • What should you ask a pentesting service provider?

    To augment their security stances, many organizations have partnered with a penetration testing (pentesting) service provider. Is your business considering doing the same? Step in “11 Questions to Ask Your Pentesting Service Provider,” a white paper that can guide your market exploration. Read now to unlock insights.

    Download

  • 4 ways to avoid gambling with cyber risk disclosure

    In this e-book, learn the top 4 ways your organization can avoid gambling with cyber risk disclosure, and discover everything you need to know about recent US SEC mandates.

    Download

  • A 6-step approach to medical device security

    Over the past few years, the healthcare industry has seen a surge in the use of connected medical devices. However, the more devices a healthcare organization deploys and connects, the bigger their attack surface becomes, putting confidential health data at risk. Read on to learn how to overcome the risk exposure of medical IoT devices.

    Download

  • 3 steps to achieve digital business readiness with IT services

    Discover the 3 essential steps, in the realm of IT services and operations, towards a successful digital-first business strategy in this e-book. You’ll also learn how to define your IT services needs with a handy checklist.

    Download

  • GRC Platform Buyer's Guide

    Navigating the crowded GRC vendor market is complicated and time consuming - there are lots of requirements to meet and lots of vendors to sort through. Consistently and efficiently evaluate your vendor shortlist across five categories and dozens of weightable features and capabilities with this free Buyer's Guide.

    Download

  • The Gorilla Guide to IT asset management

    Smarter approaches to asset management addresses the hidden asset cost gotchas; download this Gorilla Guide e-book to find out how.

    Download

  • Anticipate, Prevent, and Minimize the Impact of Business Disruptions

    Read this guide to discover how you can enable confident risk-based decisions across business and IT by building a proactive, comprehensive and competitive resilience strategy—especially in times of uncertainty and disruption. Start building a resilience programme that can give you a competitive edge, with ServiceNow.

    Download

  • Market Guide to GRC Tools for Assurance Leaders

    As risk profiles continue to grow in size and complexity at accelerated rates, organizational assurance leaders are turning to modern governance, risk, and compliance (GRC) tools to gain access to risk data, improve visibility and reporting, and enhance department agility.

    Download

  • Independent analysis of Bitdefender GravityZone

    Hackers are constantly advancing their tools and strategies to perform attacks more effectively. But when compared to those of hackers, how do your tools compare? This white paper presents the results of an independent test conducted by AV-Comparatives to provide an objective analysis of Bitdefender GravityZone. Read on to learn more.

    Download

  • 8 experts weigh in on better supply chain security

    According to Gartner, 89% of organizations have experienced a supply chain security risk event in the past 5 years. This white paper compiles the opinions of 8 industry-leading experts with the goal of providing insight into the difficulties faced when securing a supply chain, and what can be done to overcome them. Read on to learn more.

    Download

  • The enterprise buyer’s guide to IoT security

    46% of organizations are already embracing the Internet of Things (IoT) – and Gartner expects that number to rise dramatically in coming years. This e-guide provides an exclusive look at the IoT threat landscape and offers expert guidance for choosing the best-fit security tool to protect your IoT devices – read on to get started.

    Download

  • Why efficient IT asset management requires a unified, automated platform

    Discover in this e-book how ServiceNow IT Asset Management can help your organization automate the end-to-end technology asset lifecycle with a strategic workflow, and the financial benefits to which you can look forward.

    Download

  • The 4 key phases of cyberthreat defense

    See how to protect your entire enterprise by shifting from a tactical to a strategic approach in this white paper. Discover the 4 key phases of cyberthreat defense and how ServiceNow’s portfolio of SecOps and risk management tools is here to help.

    Download

  • LogicGate Risk Cloud®: A Next-Generation GRC Management Platform

    Today’s enterprises need modern governance, risk management, and compliance (GRC) software that is adaptive, integrated, and intuitive enough to meet these challenges head-on. For GRC 20/20’s Michael Rasmussen, LogicGate Risk Cloud is a top contender among those solutions.

    Download

  • Large Enterprises: Consider Your MSSP Options

    Take a look through this “ISG Provider Lens Quadrant” report to learn about 27 MSSPs that can support the needs of large enterprises.

    Download

  • An overview of attack surface management (ASM)

    With more cloud environments and digital assets in play than ever before, the enterprise attack surface has become increasingly complex and difficult to manage. This Attack Surface Management (ASM) for Dummies, e-book presents a coherent overview of ASM. Download now to unlock the extensive e-book and all the insights contained within it.

    Download

  • Checklist for attack surface management: 20+ key features

    What key features should an attack surface management (ASM) tool have? In this 6-page checklist, discover 20+ key capabilities concerning risk assessment, security operations and more.

    Download

  • Analyst report: Leading vendor in ZTNA landscape

    To unlock advice for evaluating the Zero Trust Network Access (ZTNA) market, and to learn about a leading vendor in the landscape, dig into this 2023 IDC MarketScape report.

    Download

  • Eliminate shadow IT costs & protect revenue with ITAM

    Every year, companies waste far too much money on software, hardware, and cloud resources. In fact, 66% of organizations reported having a plethora of duplicate hardware and software. Learn what it takes to develop a winning technology asset management strategy in this ServiceNow e-book.

    Download

  • Explore artificial intelligence in ITSM and the tool options

    Artificial intelligence in ITSM is the way of the future. Dive into this comprehensive buyer's guide to discover if you have the right conditions in place to introduce this multifaceted technology, and learn guidelines to help you choose the most suitable suite of products.

    Download

  • UC Management: Leader’s Guide for the Digital Workplace

    To support their digital workplaces, many organizations have adopted a UC management solution. But what sets one UC management tool apart from the rest? Browse this IDC report to discover 13 hallmarks of a sophisticated UC management solution.

    Download

  • Artificial intelligence in ITSM: Finding the right tools for you

    AI functionality is poised to be a game-changer in the ITSM world. But before exploring the possibilities for AI in ITSM, it's important to first understand what AI is - and what it is not.

    Download