Watch this video on YouTube
What is the most critical action for an information security manager to take to demonstrate due care when engaging with a fourth-party provider?