We interact with current and prospective users of the Standardized Information Gathering Questionnaire (SIG) on a daily basis. Something we’ve both observed is segmentation on how Outsourcers and Vendors are using the SIG. We see organizations using the SIG as a Vendor Assessment (Outsourcers) or as a Response Document (Vendors) – but very often, not for both functions. Yet, most organizations are both Outsourcers and Vendors – it’s what makes the world go round.
In this blogpost, we briefly review the SIG use case for Outsourcers and the separate SIG use case for Vendors. Through this exercise, we want to further the idea that you can use the SIG for both functions within your organization!
The SIG acts as a bridge between vendors and outsourcers, offering value to both parties in managing third-party risk. Outsourcers use the SIG to assess their existing and prospective service providers, while vendors use the SIG to respond to these same customers. In this way, the SIG Questionnaire creates a common language for both vendors and outsourcers. The SIG streamlines the risk management process, promotes transparency, and ultimately fosters a more secure third-party ecosystem.
Role In Risk Management: An outsourcer is a company that hires an external provider to handle tasks or create goods.
Focus: Assessing vendor’s ability to meet security requirements.
Goal: Outsourcers are Senders of the SIG. They use the SIG to assess their service providers, (or prospective service provider’s organization) as part of their third-party risk management (TPRM) program.
Key SIG Functionalities: License/pay annually, send unlimited questionnaires out to vendors across your portfolio!
Role In Risk Management: Third-party company providing goods or services to outsourcing organizations. These vendors encompass a wide range of entities, including IT service providers, software vendors, data security firms, manufacturers, consultants, and suppliers.
Focus: Proving ability to meet customer’s internal controls, security policies, and data handling practices.
Goal: Vendors are Respondents to the SIG. Use the SIG to proactively assist your customers with their third-party management of your organization as their service provider or prospective service provider. Demonstrate security posture and compliance. Having a SIG response on-hand for your customers and prospects drives efficiency and time-savings.
Key SIG Functionalities: License/pay annually, then complete and share with many!
By leveraging the SIG for both Vendor Assessments and Responses, organizations can save time and resources, improve communication with vendors, and ultimately build a more secure third-party ecosystem.
If your organization already licenses the SIG, check in with other departments or counterparts to see if they could benefit from product use, too!
Ready to streamline your TPRM program? Download our free Guide To Using The SIG or connect with us to learn more about how your organization can use the SIG.