Resources

Gain insights and learn from the brightest minds as you continue your journey from reactive to proactive vendor security.

Understanding the SolarWinds Orion Breach

One of the biggest takeaways from the recent SolarWinds breach is that no company or organization is immune to infiltration by bad actors.

Read More

Blogs

Whistic Upgrades to SIG 2021

2020 has brought unique risk challenges that have significantly shifted the focus of risk managers..... Read More

Accessing Multiple Frameworks Via a Single Source

One of the most important lessons InfoSec professionals learn early in their careers is that one.... Read More

What You Need to Know about SIG, SIG CORE, and SIG LITE in 2019

The information security landscape is constantly changing and evolving. As new threats and risk.... Read More

Replacing the FULL SIG with the New CORE SIG

No two businesses are equal, which means the way vendor assessments are conducted should also vary.... Read More

Conducting Third Party Vendor Risk Assessments Using the SIG Questionnaire from Shared Assessments

As an InfoSec leader, you already know how important (yet often convoluted) the third party vendor.... Read More

Whistic Help Center

Learn More