Grae Meyer-Gleaves, Chief Information Security Officer, Hollard Insurance Company of Australia
Chet Sharrar, Chief Information Security Officer, Marlette Funding
Initiate assessments, assign inherent risk, engage vendors, calculate risk scores and trigger reassessments—automatically.
In the fast-paced business environment we’re living in, no one has time for the slow, outdated security review processes of the past. Access the security posture of thousands of businesses immediately with Whistic.
Stop the endless cycle of one-off questionnaire requests. Add completed questionnaires to your Whistic Profile and share it proactively with customers over and over again.
All of your security documentation, certifications, and audits in one place, enabling sales to share it at the right time in the sales process.
Data security is in your control, on your servers
Vendor security not part of the sales process
No time committed to assessing vendor security
The vendor largely controls data security
Security is a consideration in the sales process
Weeks waiting for vendor to respond to Q&A
Regain control & jointly define vendor security
Security is a competitive differentiator
Vendor publishes security profile proactively
“New vendor partnerships die because of failed security assessments…We prioritized education and training across different departments, such as Sales and Marketing, so security and compliance didn’t become a roadblock in proceeding with a vendor.” Director of Compliance & Legal Affairs, Doctor on Demand
reduction in vendor assessment turnaround time
of questionnaire grading is completed within 45 minutes
If we’re being honest, vendor assessments aren’t fun for anyone involved, especially if your....LEARN MORE
As InfoSec professionals, it’s easy to get sucked into the world of the "no risk allowed, ever"....LEARN MORE
In a previous blog in this series, we noted how the growing and imminent threats of third-party....LEARN MORE