The SIG Questionnaire Tools

Using a comprehensive set of questions (content library), the SIG gathers information to determine how security risks are managed across a 18 risk control areas, or “domains”, within a service provider’s environment. The library houses comprehensive risk and cybersecurity frameworks as well as industry-specific controls.

The SIG can be used in various ways:

Used by an outsourcer to evaluate their service providers’ risk controls.

Completed by a service provider and used proactively as part of a request for proposal (RFP) response.

Completed by a service provider and sent to their client(s) in lieu of completing one or multiple proprietary questionnaires.

Used by an organization for self-assessment.

Join us for a live demo of the SIG.

Live Demo