Watch this video on YouTube
What is the MOST effective method to ensure that an IT service provider adheres to the organization's information security requirements?