This is a dedicated watch page for a single video.
As an Information Security Manager, you've just received a proposal from a promising new third-party vendor. Their software solution is attractive, but you're aware of the risks. What's the most prudent initial action to gauge the vendor's commitment to information security?