var lpData = {"site_url":"https:\/\/staging.cyberleadershipinstitute.com","user_id":"0","theme":"astra-child","lp_rest_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/","nonce":"cbb5fa8f31","is_course_archive":"","courses_url":"https:\/\/staging.cyberleadershipinstitute.com\/courses-old-learnpress\/","urlParams":[],"lp_version":"4.2.6"};
var gtm4wp_datalayer_name = "dataLayer";
var dataLayer = dataLayer || [];
window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/staging.cyberleadershipinstitute.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.1"}};
/*! This file is auto-generated */
!function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings);
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery-migrate.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/booster/assets/js/circle-progress.js
var twb = {"nonce":"9f2bd91c7a","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
var twb = {"nonce":"9f2bd91c7a","ajax_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","plugin_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/booster","href":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin.php?page=twbbwg_photo-gallery"};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/booster/assets/js/global.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.lazy.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.sumoselect.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/tocca.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.mCustomScrollbar.concat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/jquery.fullscreen.min.js
var bwg_objectsL10n = {"bwg_field_required":"field is required.","bwg_mail_validation":"This is not a valid email address.","bwg_search_result":"There are no images matching your search.","bwg_select_tag":"Select Tag","bwg_order_by":"Order By","bwg_search":"Search","bwg_show_ecommerce":"Show Ecommerce","bwg_hide_ecommerce":"Hide Ecommerce","bwg_show_comments":"Show Comments","bwg_hide_comments":"Hide Comments","bwg_restore":"Restore","bwg_maximize":"Maximize","bwg_fullscreen":"Fullscreen","bwg_exit_fullscreen":"Exit Fullscreen","bwg_search_tag":"SEARCH...","bwg_tag_no_match":"No tags found","bwg_all_tags_selected":"All tags selected","bwg_tags_selected":"tags selected","play":"Play","pause":"Pause","is_pro":"","bwg_play":"Play","bwg_pause":"Pause","bwg_hide_info":"Hide info","bwg_show_info":"Show info","bwg_hide_rating":"Hide rating","bwg_show_rating":"Show rating","ok":"Ok","cancel":"Cancel","select_all":"Select all","lazy_load":"1","lazy_loader":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/photo-gallery\/images\/ajax_loader.png","front_ajax":"0","bwg_tag_see_all":"see all tags","bwg_tag_see_less":"see less tags"};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/photo-gallery/js/scripts.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/imagesloaded.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/masonry.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/jquery/jquery.masonry.min.js
var tve_frontend_options = {"ajaxurl":"https:\/\/staging.cyberleadershipinstitute.com\/wp-admin\/admin-ajax.php","is_editor_page":"","page_events":[],"is_single":"1","social_fb_app_id":"","dash_url":"https:\/\/staging.cyberleadershipinstitute.com\/wp-content\/plugins\/thrive-visual-editor\/thrive-dashboard","queried_object":{"ID":18395,"post_author":"3"},"query_vars":{"page":"","pagename":"build-a-vendor-security-assessment-service"},"$_POST":[],"translations":{"Copy":"Copy","empty_username":"ERROR: The username field is empty.","empty_password":"ERROR: The password field is empty.","empty_login":"ERROR: Enter a username or email address.","min_chars":"At least %s characters are needed","no_headings":"No headings found","registration_err":{"required_field":"<strong>Error<\/strong>: This field is required","required_email":"<strong>Error<\/strong>: Please type your email address.","invalid_email":"<strong>Error<\/strong>: The email address isn’t correct.","passwordmismatch":"<strong>Error<\/strong>: Password mismatch"}},"routes":{"posts":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/posts","video_reporting":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/video-reporting","testimonials":"https:\/\/staging.cyberleadershipinstitute.com\/wp-json\/tcb\/v1\/testimonials"},"nonce":"cbb5fa8f31","allow_video_src":"1","google_client_id":null,"google_api_key":null,"facebook_app_id":null,"lead_generation_custom_tag_apis":["activecampaign","aweber","convertkit","drip","klicktipp","mailchimp","sendlane","zapier"],"post_request_data":[],"user_profile_nonce":"2a6c238aa4","ip":"18.97.14.80","current_user":[],"post_id":"18395","post_title":"Build a Vendor Security Assessment Service","post_type":"page","post_url":"https:\/\/staging.cyberleadershipinstitute.com\/build-a-vendor-security-assessment-service\/","is_lp":"tcb2-bright-smart-sales-page","conditional_display":{"is_tooltip_dismissed":false}};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/general.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/plupload/moxie.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-list.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/flatpickr/flatpickr.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/select2/select2.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-ovation/tcb-bridge/frontend/js/display-testimonials-tcb.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/learnpress/assets/js/dist/loadAJAX.min.js
(function(url){
if(/(?:Chrome\/26\.0\.1410\.63 Safari\/537\.31|WordfenceTestMonBot)/.test(navigator.userAgent)){ return; }
var addEvent = function(evt, handler) {
if (window.addEventListener) {
document.addEventListener(evt, handler, false);
} else if (window.attachEvent) {
document.attachEvent('on' + evt, handler);
}
};
var removeEvent = function(evt, handler) {
if (window.removeEventListener) {
document.removeEventListener(evt, handler, false);
} else if (window.detachEvent) {
document.detachEvent('on' + evt, handler);
}
};
var evts = 'contextmenu dblclick drag dragend dragenter dragleave dragover dragstart drop keydown keypress keyup mousedown mousemove mouseout mouseover mouseup mousewheel scroll'.split(' ');
var logHuman = function() {
if (window.wfLogHumanRan) { return; }
window.wfLogHumanRan = true;
var wfscr = document.createElement('script');
wfscr.type = 'text/javascript';
wfscr.async = true;
wfscr.src = url + '&r=' + Math.random();
(document.getElementsByTagName('head')[0]||document.getElementsByTagName('body')[0]).appendChild(wfscr);
for (var i = 0; i < evts.length; i++) {
removeEvent(evts[i], logHuman);
}
};
for (var i = 0; i < evts.length; i++) {
addEvent(evts[i], logHuman);
}
})('//staging.cyberleadershipinstitute.com/?wordfence_lh=1&hid=00A969870ABA9103CC4232C953E00513');
var dataLayer_content = {"pagePostType":"page","pagePostType2":"single-page","pagePostAuthor":"anirtac arim","geoCloudflareCountryCode":"US"};
dataLayer.push( dataLayer_content );
Build a Vendor Security Assessment Service
Use a risk-based approach to right-size your vendor security assessments.
If you're already a member, click here to log in.
Major Business Pain Points
- Vendor security risk management is a growing concern for many organizations. Whether suppliers or business partners, we often trust them with the most sensitive data and processes.
- More and more regulations require vendor security risk management, and regulator expectations in this area are growing.
- However, traditional approaches to vendor security assessments are seen by business partners and vendors as too onerous and are unsustainable for information security departments.
Key Points
- An efficient and effective assessment process can only be achieved when all stakeholders are participating.
- Security assessments are time-consuming for both you and your vendors. Maximize the returns on your effort with a risk-based approach.
- Effective vendor security risk management is an end-to-end process that includes assessment, risk mitigation, and periodic re-assessments.
- Develop an end-to-end security risk management process that includes assessments, risk treatment through contracts and monitoring, and periodic re-assessments.
- Base your vendor assessments on the actual risks to your organization to ensure that your vendors are committed to the process and you have the internal resources to fully evaluate assessment results.
- Understand your stakeholder needs and goals to foster support for vendor security risk management efforts.
Executive Brief
Read the concise Executive Brief to find out why you should build a vendor security assessment service and review the methodology.
- Build a Vendor Security Assessment Service – Executive Brief
- Build a Vendor Security Assessment Service – Phases 1-3
1. Define governance and process
Determine your business requirements and build your process to meet them.
- Build a Vendor Security Assessment Service – Phase 1: Define Governance and Process
- Vendor Security Policy Template
- Vendor Security Process Template
Vendor Security Process Diagram (Visio)
- Vendor Security Process Diagram (PDF)
2. Develop assessment methodology
Develop the specific procedures and tools required to assess vendor risk.
- Build a Vendor Security Assessment Service – Phase 2: Develop Assessment Methodology
- Service Risk Assessment Questionnaire
- Vendor Security Questionnaire
- Vendor Security Assessment Inventory
3. Deploy and monitor process
Implement the process and develop metrics to measure effectiveness.
- Build a Vendor Security Assessment Service – Phase 3: Deploy and Monitor Process
- Vendor Security Requirements Template
All resources on this page are provided to Cyber Leadership Hub members under license from third parties including Info-Tech Research Group Inc, a global leader in providing IT research and advice.
jQuery( document ).ready(function() {
if (jQuery(window).width() < 767) {
jQuery('body').addClass('lp-sidebar-toggle__close');
}
});
var OX = {is_loaded:false, callbacks:[], delay_ex:7E3, lazy_class:".oxlazy", mime_js:"text/oxjs", events:["scroll", "mousemove", "touchstart", "touchmove"], add_event:function(evnt, elem, func){if (elem.addEventListener)elem.addEventListener(evnt, func, false); else if (elem.attachEvent)elem.attachEvent("on" + evnt, func); else elem["on" + evnt] = func}, add_cb:function(cb){this.callbacks.push(cb)}, inject_scripts:function(scripts_obj, refnode){var i = 0, len = scripts_obj.length; if (!refnode)refnode = document.getElementsByTagName("head")[0]; for (i; i < len; i++)refnode.insertBefore(this._el("script", scripts_obj[i]), refnode.children[refnode.children.length - 1])}, _el:function(el, attrs){var elem = document.createElement(el); for (var k in attrs)if (k === "textContent")elem.textContent = attrs[k]; else elem.setAttribute(k, attrs[k]); return elem}, init:function(){this.events.forEach(function(e){document.addEventListener(e, OX.execute)}); window.setTimeout(OX.execute, OX.delay_ex)}, execute:function(){if (OX.loaded)return; document.querySelectorAll(OX.lazy_class).forEach(function(elem){if (elem.hasAttribute("data-href"))elem.setAttribute("href", elem.getAttribute("data-href")); else if (elem.hasAttribute("data-src"))elem.setAttribute("src", elem.getAttribute("data-src"))}); for (var i = 0; i < OX.callbacks.length; i++)OX.callbacks[i](); OX.events.forEach(function(e){document.removeEventListener(e, OX.execute)}); OX.loaded = true}};
document.addEventListener("DOMContentLoaded", function(){OX.init()});
( $ => {
/**
* Displays toast message from storage, it is used when the user is redirected after login
*/
if ( window.sessionStorage ) {
$( window ).on( 'tcb_after_dom_ready', () => {
const message = sessionStorage.getItem( 'tcb_toast_message' );
if ( message ) {
tcbToast( sessionStorage.getItem( 'tcb_toast_message' ), false );
sessionStorage.removeItem( 'tcb_toast_message' );
}
} );
}
/**
* Displays toast message
*
* @param {string} message - message to display
* @param {Boolean} error - whether the message is an error or not
* @param {Function} callback - callback function to be called after the message is closed
*/
function tcbToast( message, error, callback ) {
/* Also allow "message" objects */
if ( typeof message !== 'string' ) {
message = message.message || message.error || message.success;
}
if ( ! error ) {
error = false;
}
TCB_Front.notificationElement.toggle( message, error ? 'error' : 'success', callback );
}
} )( typeof ThriveGlobal === 'undefined' ? jQuery : ThriveGlobal.$j );
var astra = {"break_point":"921","isRtl":"","is_scroll_to_id":"","is_scroll_to_top":"","is_header_footer_builder_active":""};
https://staging.cyberleadershipinstitute.com/wp-content/themes/astra/assets/js/minified/style.min.js
var php_data = {"ac_settings":{"tracking_actid":25575760,"site_tracking_default":1,"site_tracking":1},"user_email":""};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/activecampaign-subscription-forms/site_tracking.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/acf-dynamic-elements.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/audio.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/carousel-libs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/carousel.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/contact-form-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/content-reveal.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/countdown.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/conditional-display.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/search-form.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/dropdown.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/divider.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/plupload/plupload.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/file-upload.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/avatar-picker.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/fill-counter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/number-counter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/image-gallery-libs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/image-gallery.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/lead-generation.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/login.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/menu.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/number-counter-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-grid-compat.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/pagination.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/post-list-filter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/pricing-table.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/progress-bar.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/social-share.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/table.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/tabs.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/timer.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/toc.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/toggle.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/twitter.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/user-profile.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/video.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/google-api.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/facebook-api.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/editor/js/dist/modules/modal.min.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/wp-user-avatar/assets/js/frontend.min.js
https://staging.cyberleadershipinstitute.com/wp-includes/js/dist/dom-ready.min.js
var starter_templates_zip_preview = {"AstColorPaletteVarPrefix":"--ast-global-color-","AstEleColorPaletteVarPrefix":["ast-global-color-0","ast-global-color-1","ast-global-color-2","ast-global-color-3","ast-global-color-4","ast-global-color-5","ast-global-color-6","ast-global-color-7","ast-global-color-8"]};
https://staging.cyberleadershipinstitute.com/wp-content/plugins/astra-sites/inc/lib/onboarding/assets/dist/template-preview/main.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-contact-form-7-tracker.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-form-move-tracker.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/duracelltomi-google-tag-manager/dist/js/gtm4wp-vimeo.js
https://staging.cyberleadershipinstitute.com/wp-content/plugins/thrive-visual-editor/thrive-dashboard/js/dist/frontend.min.js
var tcb_current_post_lists=JSON.parse('[]'); var tcb_post_lists=tcb_post_lists?[...tcb_post_lists,...tcb_current_post_lists]:tcb_current_post_lists;
/(trident|msie)/i.test(navigator.userAgent)&&document.getElementById&&window.addEventListener&&window.addEventListener("hashchange",function(){var t,e=location.hash.substring(1);/^[A-z0-9_-]+$/.test(e)&&(t=document.getElementById(e))&&(/^(?:a|select|input|button|textarea)$/i.test(t.tagName)||(t.tabIndex=-1),t.focus())},!1);