{"id":6177,"date":"2025-01-24T20:22:40","date_gmt":"2025-01-24T20:22:40","guid":{"rendered":"https:\/\/cyberassurancenow.com\/?page_id=6177"},"modified":"2025-02-03T18:13:07","modified_gmt":"2025-02-04T00:13:07","slug":"vendor-management","status":"publish","type":"page","link":"https:\/\/cyberassurancenow.com\/index.php\/vendor-management\/","title":{"rendered":"Vendor Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1737741606559{padding-top: 52px !important;padding-bottom: 40px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221;]<\/p>\n<h4>Vendor Management: Assessing and Managing Third-Party Risk<\/h4>\n<p>[\/vc_column_text][vc_column_text css=&#8221;&#8221;]Ensure your vendors meet your security standards. CyberAssurance evaluates third-party risk, performs due diligence, and develops comprehensive vendor management programs to safeguard your organization. Trust CyberAssurance to help you build a resilient and compliant vendor ecosystem.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row content_width=&#8221;grid&#8221; css=&#8221;.vc_custom_1737741606559{padding-top: 52px !important;padding-bottom: 40px !important;}&#8221;][vc_column][vc_column_text css=&#8221;&#8221;] Vendor Management: Assessing and Managing Third-Party Risk [\/vc_column_text][vc_column_text css=&#8221;&#8221;]Ensure your vendors meet your&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"full-width.php","meta":{"footnotes":""},"class_list":["post-6177","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/pages\/6177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/comments?post=6177"}],"version-history":[{"count":2,"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/pages\/6177\/revisions"}],"predecessor-version":[{"id":6179,"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/pages\/6177\/revisions\/6179"}],"wp:attachment":[{"href":"https:\/\/cyberassurancenow.com\/index.php\/wp-json\/wp\/v2\/media?parent=6177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}