Supplier Cybersecurity Assessment Audit

Audit to assess the technical and organizational capabilities of providers in terms of cybersecurity. Very useful in the homologation or requalification phase.

A supplier audit with Secdat will allow you to face the digital challenges in your supply chain.

Why carry out the Supplier Audit with Secdat?

Specialization

Highly specialized auditors provide the basis rational that will facilitate the making decisions about the rating of suppliers in
matter Security of the Information.

Tailor-made evaluation

Assess what is relevant for our business. Evaluation plans prepared completely tailored to the supplier to evaluate.

Confidence

Confidence contribution when working with Suppliers, in based on the criticality of our activity and regardless of its geographic location

3 PHASES OF THE AUDITS

1

Audit Planning

2

Carrying out the audit

3

Issuance of the audit report

1

Audit Planning

In this phase, the audit is planned and prepared. A general program of internal audits is drawn up, establishing the departments, managers, users and activities to be audited with the dates, methodologies and documentation.

2

Carrying out the audit

The Secdat auditors will hold interviews with the interlocutors designated by the entity and those responsible for the various departments within the scope of the ISMS. The verifications will be carried out by sampling the work carried out, and adapting according to the results.

3

Issuance of the audit report

Once the audit has been carried out, the Secdat auditors will issue a report in which the irregularities and deviations from the regulations will be collected. The non-conformities detected will be reflected in the audit report

In this phase, the audit is planned and prepared. A general program of internal audits is drawn up, establishing the departments, managers, users and activities to be audited with the dates, methodologies and documentation.

The Secdat auditors will hold interviews with the interlocutors designated by the entity and those responsible for the various departments within the scope of the ISMS. The verifications will be carried out by sampling the work carried out, and adapting according to the results.

Once the audit has been carried out, the Secdat auditors will issue a report in which the irregularities and deviations from the regulations will be collected. The non-conformities detected will be reflected in the audit report

Your first step
to secure your organization

If you want to contract any of our services or speak to an expert who can advise you on our solutions, send us your queries and our team will contact you as soon as possible.

Our Values