Watch this video on YouTube
As the Information Security Manager, you've discovered a pressing compliance challenge concerning a pivotal vendor. What action should take precedence?