Title: Vendor and Third-Party Management  
Author: vvogel@educause.edu Jan 21, 2014
Last Changed by: Valerie Vogel Sep 13, 2017
Tiny Link: (useful for email) https://spaces.at.internet2.edu/x/hwEDAw
Export As: Word · PDF  
Incoming Links
Hierarchy
Parent Page
    Home page: Home
Outgoing Links
External Links (50)
    csrc.nist.gov/publications/PubsSPs.html
    https://library.educause.edu/topics/cybersecurity/data-secu…
    mailto:security-council@educause.edu?subject=Supplier Relat…
    https://events.educause.edu/enterprise-it-summit/2016/proce…
    https://sharedassessments.org/
    https://library.educause.edu/topics/cybersecurity/cloud-sec…
    https://cloudsecurityalliance.org/research/collaborate/#_in…
    https://oit.ncsu.edu/campus-it/cloud-services-at-nc-state/
    https://library.educause.edu/topics/infrastructure-and-emer…
    net.educause.edu/section_params/conf/CCW10/issues.pdf
    https://events.educause.edu/annual-conference/2014/proceedi…
    www.isaca.org/cobit
    www.economist.com/news/business/21614186-tech-giants-are-wa…
    creativecommons.org/licenses/by-nc-sa/4.0/
    www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.ht…
    https://net.educause.edu/ir/library/pdf/erb1413.pdf
    https://events.educause.edu/annual-conference/2012/proceedi…
    https://library.educause.edu/resources/2016/9/nist-sp-800-1…
    www.iso27001security.com/html/27036.html
    er.educause.edu/articles/2010/6/stewards-for-higher-educati…
    https://library.educause.edu/~/media/files/library/2015/5/e…
    https://spaces.internet2.edu/display/2014infosecurityguide/…
    https://events.educause.edu/annual-conference/2012/proceedi…
    https://library.educause.edu/resources/2016/4/an-introducti…
    https://library.educause.edu/resources/2015/5/preparing-the…
    https://www.pcisecuritystandards.org/index.shtml
    www.aicpa.org/InterestAreas/FRC/AssuranceAdvisoryServices/P…
    https://library.educause.edu/topics/information-technology-…
    https://net.educause.edu/ir/library/pdf/ELI7108.pdf
    https://library.educause.edu/resources/2016/10/higher-educa…
    www.lexology.com/library/detail.aspx?g=437ccbde-5b7f-44f0-8…
    https://events.educause.edu/annual-conference/2014/proceedi…
    https://events.educause.edu/annual-conference/2014/proceedi…
    https://events.educause.edu/annual-conference/2010/proceedi…
    https://events.educause.edu/security-professionals-conferen…
    www.nist.gov/cyberframework/
    www.iso.org/iso/store.htm
    https://events.educause.edu/security-professionals-conferen…
    www.praxiom.com/iso-27002-audit-sample15.pdf
    net.educause.edu/section_params/conf/CCW10/readings.pdf
    https://events.educause.edu/annual-conference/2010/proceedi…
    www.scmagazine.com/the-failure-of-the-security-industry/art…
    https://library.educause.edu/resources/2016/9/nist-sp-800-1…
    https://cloudsecurityalliance.org/download/net-initiative-c…
    https://library.educause.edu/topics/cybersecurity/security-…
    www.ssae16.org/what-is-ssae-16/introduction-to-ssae-16.html
    www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/
    https://events.educause.edu/security-professionals-conferen…
    ptac.ed.gov/
    https://events.educause.edu/archives/2012/southeast-regiona…
Higher Ed Information Security Guide (2)     Page: Cloud Computing Security
    Page: Risk Management