![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/35c9bf62e9741240c66f0279e4838903.jpeg)
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/15180ad95af031b7be387b338eda305a.jpeg)
Their Risk Is Our Risk: Strategies for Managing Third-Party Vendor Risk
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/90b188521f9396e4850a11e8076450ed.jpeg)
I’m good.
How are you doing?
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/fa6c633d0598edbb2dce03f057363616.jpeg)
“If you know the vendor and know yourself, you need not fear the result of a hundred audits. If you know yourself but not the vendor, for every audit passed you will also suffer a failure. If you know neither the vendor nor yourself, you will succumb in every audit.” Not Sun Tsu
Not my party
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/823963381bcb9dda542927cec192345f.jpeg)
3rd, 4th, 5th, Nth party.
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/15a78b24dabfbb576165ce621240dac0.jpeg)
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/d9646ff3430e10a989224254aecf6c10.jpeg)
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/1f489d169f9891ef47eff10442eb91d0.jpeg)
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/31e9bce3dc22f713b26f619ebcc890f6.jpeg)
From
CFO
DIVE “Companies fall short on curbing cybersecurity risks from vendors: Moody’s”
![](https://assets.isu.pub/document-structure/240606213348-1be6056b4198833d7d42f8bf276c3cef/v1/10e8119ed79aacc1e222ba892916f404.jpeg)
Source- https://www.cisecurity.org/controls/v15