Vendor Risk Management Insights

Why Third-Party Security Risk Matters

Posted by RiskRecon on Mar 8, 2018 3:10:08 PM

Big Impact
Enterprises entrust the protection of their crown jewels—their customer data, their reputation, their finances, and their business availability—with third parties. Are they trustworthy? Why? Why not? What should be done about it? These questions are yours to answer and execute on. A breach of your third-party is a breach of your enterprise.

Big Challenges
Third-party risk management is hard. It requires deep transparency, strong accountability, and effective collaboration. Third-party risk has to achieve this position with hundreds and even thousands of organizations while being an outsider to every organization. Additionally, third-party risk has to solve this with limited personnel and resources. This need—to achieve really good risk outcomes from the outside with limited resources —will result in dramatic risk management innovation, key of which will be development of machine learning and artificial intelligence-based risk assessment capabilities. These inventions will occur within the context of third-party risk management and be adopted by enterprises for internal risk management. Necessity is the mother of invention, and the necessity is pressing in a big way.

The Greater Good
Third-party risk management is a process of holding enterprises accountable to good security practices. As you improve the security of your third parties you improve the security of the Internet. It decreases the likelihood of data being breached. It decreases the likelihood of systems being turned into DDOS drones or malware servers. It increases the likelihood that systems are going to be consistently available to fulfill their intended purposes. The work of third-party risk management is work for the greater good.

Read More

Topics: Continuous Monitoring, 3rd party risk management, Security Ratings, Vendor Security, 3PRM, Third Party Risk

Managing Third-Party Meltdown & Spectre Risk Exposure Strategic Recommendations Beyond Patching

Posted by RiskRecon on Jan 17, 2018 6:49:26 PM

Summary

The Meltdown and Spectre vulnerabilities represent an entirely new class of security flaws that are deeply rooted in long-standing CPU architecture. As such, Meltdown and Spectre are likely the first of many issues that will have to be dealt with quickly as research in CPU security flaws intensifies. Tactically, it is important that you ensure your third-parties implement the necessary patches. Strategically, it is essential that you reassess your standards governing third-party use of cloud-hosting providers and implement measures to bring your third-parties into compliance with the updated standards. 

In this document, we provide a brief explanation of the Meltdown and Spectre vulnerabilities and why they are so impactful, particularly to cloud computing. We also suggest a tactical plan for addressing the issue with your third-parties, and recommend strategic considerations for your larger third-party risk-governance program.

 

Read More

Topics: Continuous Monitoring, 3rd party risk management, Security Ratings, Vendor Security, 3PRM, Third Party Risk

Principles for Fair and Accurate Security Ratings

Posted by RiskRecon on Jun 20, 2017 12:01:00 PM

The U.S. Chamber of Commerce just issued “Principles for Fair and Accurate Security Ratings.”  These ratings are the first-of-its-kind guidelines for an emerging class of solutions that provide objective assessments of third-party security practices. These solutions complement traditional third-party risk management data gathering processes of vendor security questionnaires, attestation document reviews, and on-site assessments.

Read More

Topics: Continuous Monitoring, 3rd party risk management, Security Ratings, Vendor Security, 3PRM, Third Party Risk

Extending GRC with Continuous Vendor Security Monitoring

Posted by RiskRecon on Apr 24, 2017 11:25:28 AM

We speak with many clients that already have some form of governance, risk management, and compliance (GRC) program in place to assist with managing their enterprise programs. And some have software solutions to help them manage the process. This is not surprising when the market for GRC solutions is expected to grow to $38 billion by 2021.

Most companies are seeking ways to obtain more value from their GRC system—often by extending their coverage to their third-party risk management programs. Using the new class of continuous vendor security monitoring solutions is one of the best ways to add immediate value to GRC. This pairing offers a number of benefits, such as speed to identify and manage risk, valuable insight for prioritization of response, visibility into an accurate and complete vendor IT footprint, and critical transparency of exposure and actionable information on inherited vulnerabilities.

Read More

Topics: risk control, Continuous Monitoring, Vendor Risk Management, 3rd party risk management, CISO, GRC

When Apache Struts2 Hits the Fan, Respond with Data and Collaboration

Posted by RiskRecon on Mar 17, 2017 5:36:41 PM

Mitigating your third-party exposure to Apache Struts2 requires accurate, actionable data -- and fast. If you can apply automated techniques to rapidly identify which of your vendors are most likely exposed to the exploit, you can quickly prioritize your risk resources and engage constructively with impacted vendors.

Read More

Topics: risk control, Continuous Monitoring, Vendor Risk Management, 3rd party risk management, CISO

Using Threat Intelligence to Manage Third Party Risk: The Boy Who Cried Wolf

Posted by RiskRecon on Feb 15, 2017 11:30:00 AM

More and more enterprises are increasing their budgets for threat intelligence in order to stay on top of the latest security risks. The dramatic increase in third party cyber security risk seems to make it another area where threat intelligence can be applied.  But is threat intelligence actually a good fit for your third-party risk management program?

Read More

Topics: risk control, Continuous Monitoring, Vendor Risk Management, 3rd party risk management, CISO

Part 2:  Incorporating Continuous Monitoring into Your Third-Party Risk Management Program: The Pilot is Complete – Now What?

Posted by RiskRecon on Jan 31, 2017 1:30:00 PM

One of the most common questions we’re asked is how to incorporate continuous monitoring into a third-party risk management program. In part one of this two-part blog, we discussed beginning with the end state in mind to establish goals for your continuous monitoring program and suggested you jumpstart your program with a pilot. So once the pilot is complete, now what?

Read More

Topics: risk control, Continuous Monitoring, Vendor Risk Management, 3rd party risk management, CISO

Part 1:  Incorporating Continuous Monitoring into Your Third Party Risk Program: Begin with the End State in Mind

Posted by RiskRecon on Jan 20, 2017 1:39:28 PM

Like many organizations today, you have existing processes, tools and people laser-focused on analyzing periodic vendor security questionnaires, documentation, and on-site reviews. Moving to a continuous monitoring program can be daunting.  Our advice: Don’t focus on where to start…think about where you want to end up.  Begin with the end state in mind.

Read More

Topics: Scalability, risk control, Continuous Monitoring, Vendor Risk Management, 3rd party risk management, CISO

New Call-to-action

Subscribe to Email Updates

Recent Posts