This website uses cookies. For more information please contact us or consult our privacy policy.

Your binder contains too many pages, the maximum is 40.

We are unable to add this page to your binder, please try again later.

This page has been added to your binder.

Designing and Implementing a Three-Step Cybersecurity Framework for Assessing and Vetting Third Parties

April 8, 2015, The Cybersecurity Law Report

Covington's David Fagan is quoted regarding cybersecurity:

"Companies 'should have a process in place to categorize vendors in terms of levels of risk and then they should apply assessment from that basis,' Fagan said. The first step should be to 'assign a risk classification to them. And that should track to what kind of assessment you provide.'"

Share this article: