1. This site uses cookies. By continuing to use this site, you are agreeing to our use of cookies. Learn More.

How to build cybersecurity into outsourcing contracts

Discussion in 'Network World' started by RSS, Apr 6, 2016.

  1. RSS

    RSS New Member Member

    Any time a company shares data or provides access to third-parties, it increases its vulnerability to unauthorized access or breach. So in today’s IT environment in which enterprises partner with multiple IT service providers, who in turn may have multiple subcontracters, cyber risks increase exponentially.

    [ Related: Why CIOs can’t wait to renegotiate their outsourcing contracts ]

    “Customer data and systems are only as secure as the weakest link in the vendor ecosystem,” says Paul Roy, a partner in the business and technology sourcing practice of Mayer Brown. “The risks for customers are twofold: not only does the customer increase its risk of a data breach, it also increases the risk that it will be in breach of its regulatory or contractual obligations if its vendors fail to comply with such obligations.”

    To read this article in full or to leave a comment, please click here

    (Insider Story)

    Continue reading...

Share This Page