Security Questionnaires: You Can’t Just Blame the Intern

December 12, 2024

Let’s face it—no one enjoys security questionnaires. They are tedious and time-consuming, and it’s easy to question their real effectiveness in mitigating security risks, especially since they’re often a check-the-box exercise. However, in today’s digital landscape, they are unavoidable for building and maintaining trust with customers. Join us as we confront this harsh reality: despite our dislike for them, we bear immense liability in ensuring they are handled with integrity and consistency. We can’t just buy a tool or hire a low-cost resource and then blame them when errors occur and cause issues with customers. Leave this chat with insights about the legal implications for your answers, how to mitigate the risks and new ways to manage the fall out.

 

You May Like These Posts

Security Awareness Training – Verizon 2025 Data Breach Investigations Report

In this 15-minute training, the HG team breaks down the most critical findings from Verizon’s 2025 Data Breach Investigations Report (DBIR)—and what they mean for real-world security programs. We cover the sharp rise in third-party breaches, the growing threat of GenAI misuse, and the continued dominance of ransomware and credential-based attacks. You’ll walk away with […]

The Difficulties of People Taking Ownership

So, you've got an amazing team of tech savvy folks who love the tech side of things.     They excel in implementing the latest tools and systems, but when it comes to the less glamorous side - like making sure tasks are completed and nobody drops the ball - things start to get a bit […]

Where Compliance Meets Security: Doing Both the Right Way

Compliance and cybersecurity are often seen as separate priorities—but the truth is, good compliance reduces risk when done right. So how do you effectively integrate both for a stronger security posture? In this session, we’ll break down the intersection of compliance and cybersecurity, share best practices, and walk through real-world examples of organizations that have […]

Bridging the Gap: Why Cybersecurity Tools Alone Aren’t Enough

Investing in the latest cybersecurity tools doesn’t automatically mean you’re secure. Many leaders feel the initial promise of a new solution—only to realize it’s not delivering the protection they expected. So, what’s missing? In this session, we’ll break down where the responsibility of the tool ends and where your team’s role begins. We’ll uncover why […]

What Operationalized GRC Actually Looks Like: From Silos to Systems

Many organizations believe their GRC program is operational because audits are passing and tools are in place. In reality, operationalized GRC behaves very differently. Risk has clear ownership. Information flows across teams. Gaps surface early instead of being hidden. In this session, Cheri Hotman and Peter Spier walk through what an operationalized GRC program actually […]

The Maturity Gap: Why GRC Programs Plateau (and How to Advance)

Most GRC programs reach a point where they stop growing—mature enough to pass audits, but not resilient enough to lead. In this session, we’ll reveal the key traits of high-maturity programs and what it takes to get there. You’ll learn how to identify your plateau, remove roadblocks, and strategically advance your organization’s governance, risk, and […]

Why Cybersecurity is as much Art as Science

In this kickoff episode of The Art of Cybersecurity, host Cheri Hotman shares why this podcast exists and what listeners can expect. Cyber isn’t just science or technology — it’s art. It’s messy, constrained, people-driven, and ultimately about mitigating risk to protect people and data. Cheri cuts through the noise of “easy button” tools, audit-passing […]

Real Life GRC Horror Stories: Top Mistakes Haunting Your Program

Just in time for Halloween, we’re pulling back the curtain on the Top 10 GRC Nightmares plaguing organizations today. From programs that only exist to “pass the audit,” to treating compliance as a checkbox exercise, these haunting mistakes can leave your organization more vulnerable than you realize. In this session, we’ll identify the most common […]

Supply Chain Security: Managing Risk Beyond Your Vendors

When it comes to third-party supply chain security, there’s a big difference between doing it and doing it right. Every vendor you work with brings their own vendors into the mix—so who truly owns the risk? In this session, we’ll explore how to identify, assess, and mitigate supply chain risks at every level without overburdening […]

Post A Comment

Leave a Reply

Your email address will not be published.

Endless audits and customer demands were never supposed to replace real security.
We build, implement, and run Cyber GRC programs that reduce risk, protect the business, and still pass audits.

Hotman Group is a certified

woman-owned business (WOSB)

Hotman Group, LLC

Fort Worth, TX

Privacy Policy | Terms of Service | All Rights Reserved © Hotman Group, LLC