eBook | How the Exchange Assessment Works: Explaining Control Mapping and the Emergence of the SIG Lite


There are dozens of frameworks, standards, and laws that third-party risk teams care about. These vary based on many factors, such as industry, location, or risk domain. To account for this, the OneTrust Vendorpedia™ Third-Party Risk Exchange leverages the Shared Assessments SIG, the leading standard in third-party risk. Doing so enables us to take an assessment mapping approach, meaning you can view your vendors’ risk and control gaps through the lens of framework, standard, or law of your choice.

In this eBook, you’ll learn:

  • How assessment and control mapping works
  • Why we take and assessment-mapping approach
  • The frameworks, standards, and laws the Exchange supports


Are you interested in learning how OneTrust Vendorpedia can help your business streamline TPRM? Click here to get a 1-on-1 demo aligned to your team’s needs with personalized best practice advice from a third-party risk expert.

Get Resource

Note: All fields marked with * are required

I’d like email updates on local privacy events and news, resources and products to stay connected with my community. Unsubscribe at any time.

I’d like a solution expert to provide product information or show me a custom demo of the OneTrust platform

How would you like us to contact you?

Privacy Notice

You can learn more about how we handle your personal data and your rights by reviewing our privacy notice.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

You Might Also Be Interested In

OCT 19, 2021

New NIST Framework for Ransomware: What It Means for Third-Party Risk

SEPTEMBER 17, 2021

eBook | How the Exchange Assessment Works: Explaining Control Mapping and the Emergence of the SIG Lite

SEP 08, 2021

Get Ready: Vendor Compliance and the UK’s Proposed TRA, IDTA and Amended EU SCCs

AUGUST 17, 2021

10 Steps to Build Your Vendor Risk Management Program

JULY 17, 2021

Vendor Risk Management Success: What You Need to Know When Building Your VRM Program

JUL 22, 2021

Supply Chain Attacks: The Rise of Ransomware and How to Reduce Your Risk

JULY 8, 2021

Building Your Third-Party Risk Management Program: What You Need to Know and Why

JULY 1, 2021

Mastering the Third-Party Risk Management Lifecycle

Onetrust All Rights Reserved