
Contracting for cybersecurity risks: Mitigating weak links
November 28, 2022
Managing vendor risks includes putting pen to paper. Organizations are increasingly susceptible to risks outside their controlled IT infrastructure as they engage third-party vendors to manage online platforms and process data. Even though an organization may have little to no control over a vendor’s security practices, it bears the ultimate responsibility for safeguarding its own data and systems. Accordingly, an organization’s systems are only as strong as their weakest link.