• CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • CUSTOMER LOGIN
  • Products
    • TPRM by ThirdPartyTrust
    • Beacon by ThirdPartyTrust
  • Company
    • About us
    • Partners
    • Product Security
    • Privacy Policy
REQUEST DEMO
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY

Building a Scalable Third-Party Risk Management Program

Published by anders on February 18, 2020
Categories
  • Blog
Tags
  • TPRM Best Practices
Building-a-scalable-TPRM-program

Most organizations assess vendor risk in one way or another: be it with emails and spreadsheets or with dedicated tools. However, the challenges around efficiency and repetitive work remain. In addition, a lack of consistent reporting and continuous monitoring could make an organization vulnerable to data breaches.

Building a scalable third party risk management program (TPRM) can help you stay ahead and secure your supply chain.

What is a Scalable Third-Party Risk Management Program?

A scalable program is one where you, on a continuous basis, mitigate the risk that arises from third-party and subcontractor relationships based on a business decision to outsource.

How to start? 

It is important to remember that the purpose of a third party risk management program is to understand where risk exists arising from the use of third parties and to remediate this risk to your organization. When establishing a program, focusing on ‘quick wins’ that allow you to demonstrate progress is an essential building block for program success.

Understand your inventory of third-parties. Start with the most important ones from a risk perspective. Those would be the companies that you exchange confidential and restricted information with, and the ones you grant access to your information and to your various platforms and infrastructure. Ask these companies who their third-parties are as well. Realize that building the full third party inventory will take an extended amount of time.

It will be useful to ask yourself these questions:

  • Who do you share non-public data with?
  • Who do you grant access to data and company infrastructure?
  • Who develops software for your critical business applications and how mature is their software development process from a security perspective?

What are other important steps to building a scalable third-party risk management program?

Put in place a data security appendix for new contracts with third parties being onboarded that provides for three critical things:

  1. Right to audit, which gives you the ability to perform assessments
  2. Notification of any potential breach when it occurs
  3. Commitment to resolve security issues or gaps that are identified.

These steps will assist you in having a process that is efficient in assessing and mitigating the risk that arises from the use of third-parties. You could spend a lot of time and money trying to build the perfect program and not do anything to mitigate the risk that comes from outsourcing. This part of the conversation sometimes gets lost because people focus on making sure they have all the components of the program in place before they begin to address the risk that exists.

How to begin addressing risk?

Defining clear goals early on will result in quick wins.

The program is not meant to assess, but to assess and mitigate the risk associated with third-party outsourcing relationships. However, many programs assess risk and stop. They don’t hold the third-party accountable for mitigation of the issues that were identified, so they don’t achieve the key goal of risk mitigation.

A scalable third-party risk management program should involve the ability to continuously monitor the controls that are in place at your third-party. So it might be helpful to ask:

  • What are the new vulnerabilities that were discovered and need to be patched timely by the third-party?
  • What are the changes in the third-party’s network configuration that may result in an open threat actor to exploit?
  • Has any new functionality added to a third-party service or product been properly tested and secured to ensure there are no vulnerabilities associated with it?

Start with monitoring your most critical third parties to identify security issues that may exist which have the potential to be exploited. Run a limited pilot and don’t try to boil the ocean by performing security scanning of a large number of your third-parties initially. Build out a process that allows you to take action on findings and mitigate them. You can scale it later, and also discover unknown fourth-party / subcontractor relationships.

What about risk management across the whole supply chain?

When you start looking at risk in your supply chain, you have to divide your third-parties into two groups: 

  1. The new third-parties that you’re bringing into your company
  2. The existing third-parties that you’ve already onboarded

This is the concept that I call “stopping the bleeding” that occurs when you continue to bring new companies on board and not properly address security, both from a risk assessment perspective and from a legal or contractual perspective.

How does this division between “new” and “existing” enable escalation?

The benefit is that new third-parties can be the starting point to build a scalable program. You start with the new, and then, when you have a program that is scalable and more mature, you go on to address existing third-parties through your new process.

So when a contract comes up for renewal, for example, you can address some of the contractual aspects that may not have initially been addressed prior to having a data security appendix for the contract in place.

Is building a scalable third-party risk management program resource intensive?

It depends on the size and complexity of the organization and its third-party ecosystem, but everyone can start small and scale to meet organization needs. Different industries and different companies within industries have different risk profiles and use outsourcing to different extents, and some take greater risks than others.

One of the opportunities that companies have is to move to a continuous monitoring of their third-parties and away from a “point in time” assessment (say once a year). The greater use of technology means that companies will be less reliant on people to perform ‘point in time’ assessments in the future and they’ll have a more accurate and timely understanding of the risk that exists within their environment.

The Key Concept is “Continuous”

Your initial critical insights may come from the first ‘point in time’ assessment. After that, if you have a framework that allows you to continuously monitor the controls in place and the changes in the relationship with the third-party, it’s much more effective than doing an annual assessment, which over time yields less insight and is static in nature, while expensive to perform. This would tell you where you stand at a point in time, but how can you guarantee that form a security perspective you are OK for the remaining 364 days of the year?

The real value comes in understanding on an ongoing basis the security posture of the third-party.

 


 

To learn how our ThirdPartyTrust platform can help you scale your TPRM program, request a demo now:

 

Request Demo
anders
anders
  • Phone
    |+1-617-245-0469
  • Address
    |
    111 Huntington Ave, Suite 2010, Boston, MA 02199
  • Sales
    |sales@bitsighttech.com
  • Contact Us
Laika_SOC2_TypeI_PurpleIris        CSA_Trusted_Cloud_Provider

©2024 ThirdPartyTrust, LLC and its Affiliates. All Rights Reserved. | 111 Huntington Ave. Suite 2010 Boston, MA 02199
  • PARTNERS LOGIN
  • CONTACT US
  • PRIVACY POLICY
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Reject AllAccept
Cookie Settings
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT