The Ponemon Institute recently rolled out there second annual study of Data Risk in the Third-Party Ecosystem. The study aims to understand trends in the challenges companies face in protecting sensitive and confidential information shared with third parties and 4th party vendors.
Since the study was first conducted last year, companies have made little progress in improving the overall effectiveness of their third-party risk management programs. In areas such as:
A serious barrier to achieving these objectives is the lack of adequate resources to manage third-party risk.
Fifty- six percent of companies confirm that their organizations experienced a data breach caused by one of their vendors and the sensitive information stolen was misused.
Only 17 percent of companies rate their companies’ effectiveness in mitigating third-party risk as highly effective and less than half of all companies say managing outsourced relationship risks is a priority in their organization.
Accountability for the third-party risk management program is dispersed throughout the organization but only five percent of organizations say it has an owner. And only one-third of all companies say their organization regularly reports to the board of directors on the effectiveness of the third-party management.
More than half of all companies do not keep a comprehensive inventory of all third parties with whom they share sensitive information. And the average number of third parties with access to confidential or sensitive information has increased from 378 to 471 third parties and visibility only gets worse with 4th-party relationships.
Less than half of all companies say that their company evaluates the security and privacy practices of all vendors before starting a business relationship that requires the sharing of sensitive or confidential information. If they do conduct an evaluation, it is mostly to acquire signatures on contracts that legally obligate the third party to adhere to security and privacy practices.
ThirdPartyTrust’s technology helps teams easily inventory vendors, partners and contractors in the simplest fashion; by simply requesting a connection to the vendor’s profile. In turn, a vendor only has to create one profile and can share with all their companies asking for security documentation.
We believe in a holistic view, which is why we partned with SecurityScorecard to bring you web application scans included in the platorm. We also pull publicly available data breaches and have included the BITS Sig Lite questionnaire, Google’s Vendor Security Assessment Questionnaire, and the Cloud Security Alliance questionnaire in the platform. Try the platform for free for thirty days, just click the button below.
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|