This is a dedicated watch page for a single video.
An organization is expanding its business operations to include a significant number of third-party vendors. The information security manager has been asked to develop a strategy to manage third-party security risks. What should be the first priority in developing this strategy?