Building A Third Party Risk Management Program 1698113369
Building A Third Party Risk Management Program 1698113369
Serious security
professionals
use people-first
third party risk
management.
Building A
Third Party Risk
Management Program
Introduction
Your Complete Guide According to the 2021 Ponemon Institute Report, 74% of companies
that experienced a data breach reported that the root cause of
To Third Party Risk
the breach originated from a third-party. While you can never truly
Management eliminate third party risk, you can certainly manage it.
Not only does a third party risk management (TPRM) program work
to mitigate vendor risk, serious security people who have a robust
system of practices and procedures in place gives their organization
the ability to move swiftly and effectively when onboarding, and
offboarding a third party.
We’ll Cover
2
The State of Third
Party Risk
3
THE STATE OF THIRD PARTY RISK CONTINUED
The problem? to cyber threats as any company–if not more with millions of data
points enticing cyber criminals to attack.
Organizations are
not devoting the When you don’t have enough eyes on third party risk, you create
a domino effect: not enough staff dedicated to TPRM leads to
appropriate resources overworked employees, which leads to human error which can lead to
to managing third party granting too much privilege to third parties or overlooking high-risk
vendors.
risk.
A TPRM program is your first line of defense against cyberthreats that
originate from outside your organization. And in this day and age, the
move to cloud-based services reinforces the need for third party risk
measures. You should ask yourself: are these third parties you interact
with handling your data appropriately? What information should they
(or should they not) have access to?
4
Avoid These
Third Party Risk
Management Mistakes
5
AVOID THESE 3RD PARTY RISK MANAGEMENT
MISTAKES CONTINUED
Avoid These 3. Not Running A Third Party Risk Assessment On An Annual Basis
Third Party Risk Some organizations feel that a one-time third-party risk
assessment is sufficient. Cyber criminals are relentless and are
Management Mistakes constantly changing and adapting their tactics to gain access
to protected or sensitive information. Your business needs to be
constantly working to be one step ahead of the hackers. Keeping
vendor risk assessments up-to- date annually alerts you to their
vulnerabilities.
6
Third Party Risk Management
Challenges (And How To
Tackle Them)
CHALLENGE #2
7
THIRD PARTY RISK MANAGEMENT CHALLENGES CONTINUED
CHALLENGE #3
8
How To Build Your
Third Party Risk
Management Program
This makes it even more challenging to know where data might be,
let alone ensure that your vendor is protecting it appropriately. Even
renowned, everyday technology companies have demonstrated a clear
disregard for implementing effective security protocols. For example,
Zoom recently was forced to pay an $85M fine after the FTC alleged
that they “engaged in a series of deceptive and unfair practices that
undermined the security of its users.”
While not all vendors will have access to sensitive data, and therefore the
risk may not be as consequential, it is critical for companies to assess
vendors by risk level and set relevant mechanisms in place to ensure that
those who do have access to data are taking the appropriate measures to
protect it.
9
HOW TO BUILD YOUR THIRD PARTY RISK MANAGEMENT
PROGRAM CONTINUED
0
1
About
Ostendio
Ostendio’s Ostendio™ helps companies to build, manage and demonstrate their information security
framework. The Ostendio platform provides an enterprise view of an organization’s cybersecurity program.
Ostendio’s unique bottom-up security approach provides a workflow solution which engages every
employee and manages all aspects of security and compliance which allows organizations to easily report
their security posture to internal and external stake-holders. With Ostendio, customers can ensure they
are secure and compliant.
Ostendio is headquartered in Arlington, VA and has customers in North America, Europe, the Middle East
and Australia. For more information about Ostendio’s Ostendio, please visit www.ostendio.com.