Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

video

How, When & Why to Use a Vendor InfoSec Questionnaire

CPE Credit Eligible

When should I use an information security questionnaire?

Learn how, when and why to use information security questionnaires and how your due diligence process can benefit.

You may also be interested in:

Video Transcript

Welcome to this week’s Third Party Thursday! My name is Aaron Kirkpatrick and I’m the Information Security Officer here at Venminder. During this video we are going to discuss the how, when and why to use an Information Security Questionnaire.

One of the simplest questions we get asked is, “Why do I need an information security questionnaire?”  They’re supposed to protect data, so why should you care as a financial institution?

Generally, the best practice is to use an information security questionnaire prior to the contract being signed and with a full review by an information security expert (and then refresh it annually).

Any company who even has the most remote access to your customer’s data should be asked questions as to their processes, testing around their procedures and records of any incidents and remedial steps they took to lessen the chance and impact of a similar event occurring again.

Obviously, some won’t have really rigid processes. Perhaps you’re thinking of the office cleaners you employ – if they have unescorted after hours access, they have access to customer information. Should there be a bad person on their team – discuss the background checks they do on new hires and whether they’ve had to fire anyone for misconduct, and inquire about their professional liability insurance. The same goes for your shredding company. Perhaps observe them perform the shredding and require a certified letter of destruction.

Developing an information security questionnaire can be very in-depth and challenging. There are standardized questionnaires such as the Shared Assessments SIG or SIG lite, but when those aren’t available they’re best developed by someone with broad information security knowledge such as a Certified Information Systems Security Professional (CISSP) with experience with a wide range of vendor offerings.

Asking the right questions up front can prevent a lot of bad discovery moments down the road.

To recap:

  • It's ultimately the bank or credit union's responsibility to safeguard their customers information. You can’t outsource that risk.
  • You should use an Information Security Questionnaire prior to the contract being signed as a part of other due diligence.
  • Questionnaires can be in-depth and challenging to create, and are best developed by someone with diverse information security knowledge.

Again, I’m Aaron Kirkpatrick and thank you for watching! If you haven't already, please subscribe to the Third Party Thursday series!

38116-newsletter

Subscribe to our Third Party Thursday Newsletter

Receive weekly third-party risk management news, resources, and more to your inbox.

 

New Call-to-action

Ready to Get Started?

Schedule a personalized solution demonstration to see how Venminder can transform your vendor risk management processes.

Request a Demo