Cyber Risk Leaders Magazine - Issue 6, 2021

Page 12

CYBER SECUIRTY

Best practices for trusted thirdparty risk management By Miryam Meir

T

hird parties are a necessary part of your enterprise. They are your vendors, your suppliers, your contractors, and your partners. Without them, you can’t do business. Third parties provide cloud services, store sensitive data, and provide other important services. Unfortunately, third parties are also a major source of cyber risk. Cybercriminals often target third-party providers to target their clients’ data and networks, such as the notorious SolarWinds breach at the end of 2020. To move your business forward and propel growth, you need to be able to trust your third parties and their security posture. For this reason, Third-Party Risk Management (TPRM) is critical for every organization.

What is TPRM? Third-party risk management, or TPRM, is the process of vetting your vendors so that you can understand the risks they may pose to your organization and the supply chain itself. Organizations with strong vendor risk management programs systematically identify, assess, and mitigate threats to their assets and data that might be caused by the organization's supply chain. Most organizations do business with a number of third parties, and those third parties fill many roles. In fact, Gartner found that 60% of organizations work with over 1,000 third parties. Some are vendors, but others fall into

12 | Cyber Risk Leaders Magazine

different categories, such as partners, contractors, and consultants. Therefore, TPRM is an umbrella that covers VRM as well as other kinds of third-party risk management, such as: Supplier Risk Management, IT vendor risk, antibribery/anti-corruption (ABAC) compliance, and contract risk management, among others. Why is third-party risk management important? It’s never good news when third parties are involved in a data breach; Ponemon’s 2021 Cost of a Data Breach Report found that if a software vulnerability at a third party causes a data breach, the cost tends to increase by more than $90,000. That’s not great; most data breaches are already steep at an average of $4.24 million. Third-party breaches are becoming increasingly frequent, however. According to InfoSecurity Magazine, 44% of organizations were found to have experienced a security breach in the last year. Of those companies, 74% said that the breach occurred because too much privileged access had been given to third parties. That’s the problem, however — often third parties need access to your systems and data to be effective, but you don’t have the same control over your third parties as you do your own employees. You can’t require the employees or contractors of another company to adhere to your own standards — but if your customers’ data is exposed because of a third-party, that breach is still your responsibility. So how can you trust your third parties with your data?


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

ASITII FESTIVAL OF SPACE 2021

1min
pages 54-55

Cyber Risk Leaders - INTERVIEWS

1min
pages 47, 51, 57-58

AUDITING AI & EMERGING TECHNOLOGY

1min
page 33

6G A paradigm shift and physical layer security

1min
page 21

Lim Thian Chin

1min
page 20

SECURITY REIMAGINED- LEARN HOW TO IMPLEMENT ACTIONABLE INTELLIGENCE FOR EFFICIENT SAFE ENVIRONMENTS

1min
page 25

NOMINATIONS OPEN ON 8TH MARCH 2022*

1min
page 45

Group-IB Chief Executive Officer facing treason charge following arrest

2min
page 46

Facebook’s network backbone breaks, causing six hour outage

2min
page 44

President Biden Warns "Lock Your Digital Doors"

2min
page 42

Beware of the return to office: How organisations can protect against pandemic sleeper threats

5min
pages 40-41

How to empower your people to become your greatest risk management asset

3min
pages 38-39

Why organisational risk starts and ends with your people

4min
pages 36-37

New Insights into The Devilstongue Spyware Impacting Journalists, Human Rights Defenders and Politicians

1min
page 35

Market opportunities for 5G, IoT and edge compute

7min
pages 28-30

Network and Data Center Security

7min
pages 26-27

Singapore Cyber Landscape – highlights at ISACA Singapore Chapter’s GTACS 2021 conference

3min
pages 22-23

Deepening collaborations for cybersecurity - Highlights from the Singapore international cyber week 2021

8min
pages 16-19

Trusted third party risk management

7min
pages 12-15

Turning cyber health scare into digital trust

5min
pages 10-11

Cyber Risk Leaders Magazine - Issue 6, 2021

4min
pages 1, 9-14
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.