This is the definitive study of third-party security risk management practices. Based on in-depth interviews of risk executives from 30 domestic and global firms, it reveals the real-world capabilities and practices employed to manage third-party security risk.
Compare your own program with the Playbook data about what other organizations are doing. You can then identify your own goals and objectives and refer to the Playbook to determine which capabilities and practices make sense for you.