How to Select a Third-Party Risk Management Framework in 2019

Those driving organizations need to reconsider how they approach, identify and manage third-party risk.

Financial services organizations in or operating in the United States must have a strong focus on third-party risk management due to the increasing regulatory focus and complexity of relationships with foreign and domestic third-parties. Outside of the United States, countries like Australia have a strong focus on third and fourth-party vendor management in financial services via APRA’s Prudential Standards, too.

As organizations grow in size and complexity, the ability to manage third-party relationships becomes ever more critical to success. Organizations that struggle to expand their third-party ecosystem, for fear of the risks it can create, will be disrupted by organizations who can confidently identify and manage risk.

Every organization, whether regulatory required or not, need to have third and fourth-party risk management as foundational parts of their overall information security risk management process, including ongoing monitoring of all third and fourth-party providers.

Table of contents

  1. What is third-party risk management (TPRM)?
  2. Why you do I need a third-party risk management framework?
  3. How do I select a third-party risk management framework?
  4. Is my business liable for third-party breaches?
  5. Is my organization liable for third-party breaches if we are not in financial services?
  6. What are the best practices for a third-party risk management framework?
  7. How UpGuard can help you reduce your third-party vendor risk

What is third-party risk management (TPRM)?

Third-party risk management (TPRM) is the process of analyzing and controlling risks associated with outsourcing to third-party vendors or service providers. This could include access to your organization’s intellectual property, data, operations, finances, customer information or other sensitive information.

This means due diligence is required to determine the overall suitability of a third-party for a given task and increasing whether they can keep the information secure.

Due diligence is the investigative process by which a third-party is reviewed to determine if it’s suitable for a given task. Due diligence is an ongoing process including review, monitoring and management communication over the entire vendor lifecycle.

The goal of any third-party risk management program is to reduce the likelihood of data breaches, costly operational failures, vendor bankruptcy and to meet regulatory requirements. Managing third-party risk is nothing new, but the level of risk that is being taken on is.

Organizations are now facing risks such as the threat of high profile business failure, illegal third-party actions being attributed to the organization, or regulatory enforcement for actions taken by third-parties.

Why you do I need a third-party risk management framework?

It is critical organizations have a robust, mature third-party risk management program that encompasses all aspects of risk and all stages of the lifecycle that a third-party relationship can transition through from initial due diligence to business continuity.

It is not enough to have a myopic focus on operational risk factors like performance, quality standards, delivery times, KPIs and SLA measurement. Increasingly, reputational and financial risks are more important. Such as labour practices, information risk management, financial health.

Legal and regulatory requirements should also be understood. Such as compliance with bribery regulations, awareness of global industry standards as they apply to third-parties, as well as environmental and health and safety compliance.

Senior management must understand the high risk their organization is exposed to from cyber security attacks and data breaches from their organization and their third and fourth-party service providers. Regardless of your organization’s risk profile, establishing a third-party risk management process is a critical part of internal audit and reducing risk exposure.

Third-parties include your vendors, suppliers, business channels, marketing partners, payroll providers, and anything else that could cause financial, regulatory compliance, or reputational damage if breached.

How do I select a third-party risk management framework?

Your choice of a third-party risk management framework should be based on your organization’s regulatory requirements, acceptable level of risk, use of third-parties, business processes, joint ventures, compliance requirements and overall enterprise risk management strategy.

Organizations are now leveraging third-parties directly in their supply chain, as well as auxiliary services like sales, distribution and support. The increasing use of technology, like cloud and cloud-based applications, is further accelerating the trend toward outsourcing and increasing associated risks.

Further, the value of the tasks being executed by third-parties is increasing, increasing the impact of disruption or failure of third-party vendors.

Third-party risk is a feature on board agendas with CEO/board-level responsibility in many organizations especially those operating in regulated environments. Visits to third-party locations are becoming more common to gain assurance over third-party management.

As businesses become more decentralized, there is increasing need for consistent third-party governance frameworks. Best-in-class organizations are leveraging third-parties extensively while effectively managing the risks associated.

Is my business liable for third-party breaches?

If you work in the financial services industry, the short answer is yes.

In the United States, the Office of the Comptroller of the Currency(OCC) wrote in its risk management guidance:

A bank’s use of third parties does not diminish the responsibility of its board of directors and senior management to ensure that the activity is performed in a safe and sound manner and in compliance with applicable laws.

Along with the OCC, the Federal Reserve System(FRS) and the Federal Deposit Insurance Corporation(FDIC) have statutory authority to supervise third-party service providers in contractual agreements with regulated financial institutions.

In the Supervision of Technology Service Providers booklet from FFIEC, it is highlighted that the use of third-party providers “ does not diminish the responsibility of the…board of directors and management to ensure that activities are conducted in a safe and sound manner and in compliance with applicable laws and regulations, just as if the institutions were to perform the activities in-house.

If you’re in Australia and regulated by APRA, read our post on APRA CPS 234: Information Security Prudential Standard.

Is my organization liable for third-party breaches if we are not in financial services?

A non-US headquartered multinational company, with interests in electricity generation and transmission as well as rail transport, was fined US$ 772 million in December 2014 for engaging in conduct in violation of the Foreign Corrupt Practices Act (FCPA). This has mainly resulted from the inappropriate conduct of third parties and ineffective due diligence and corporate controls over such third parties.

Remember, even if your business does not have financial or regulatory responsibility for third-party breaches or failures, they can still do massive reputational damage that leads to financial loss and more importantly, loss of customer trust and data.

What are the best practices for a third-party risk management framework?

Both the National Institute of Standards and Technology (NIST) and International Organization for Standardization (ISO) have popular risk management frameworks that can be used together in the assessment process of any third-party risk management program.

In general, best practices for any risk management framework are to:

  1. Take inventory of all third-party vendors your organization has a relationship with
  2. Catalog cybersecurity risks that the counterparties can expose your organization to
  3. Assess and segment vendors by potential risks and mitigate risks that are above your organization’s risk appetite
  4. Develop a rule-based system to assess future vendors and set a minimum acceptable hurdle for the quality of any future third-parties in real-time by reviewing data security and independent reviews
  5. Establish an owner of vendor risk management and all other third-party risk management practices
  6. Define three lines of defense including leadership, vendor management and internal audit
  • The first line of defense — functions that own and manage risk
  • The second line of defense — functions that oversee or specialize in risk management and compliance
  • The third line of defense — functions that provide independent assurance, above all internal audit

7. Establish contingency plans for when a third-party is deemed below quality or a data breach occurs

Establishing a third-party risk management framework means the financial and reputational damage to your organization will be minimize if a third-party data breach does occur. Data breaches can have massive impacts on your customers, employees and the position of your organization in the market.

Third-party risk management frameworks provide your organization with shared standards for decision-making, minimizing the hassle and time it takes to manage third-party vendor risk. Ultimately saving your organization money and more importantly, its reputation and relationship with its customers.

How UpGuard can help you reduce your third-party vendor risk

Managing third-party relationships can be a big task. As a result, many organizations have opted to use intelligent tools that use first and third-party data to monitor cybersecurity risk and to improve the overall security posture of an organization.

UpGuard customers automatically monitor their vendors security performance over time and benchmark them against the industry.

Each vendor is rated against over 50 criteria providing a daily Cyber Security Rating. We can automatically send vendor security questionnaires to help you gain deeper insights into your vendors, improve your coverage and scale your security team.

Book a demo today.

Originally published at



-- — UpGuard combines third-party security ratings, vendor questionnaires, and threat intelligence in a single cyber risk solution.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

What Is a Man-in-the-Middle Attack and How Can It Be Prevented

What is a Man-in-the-middle attack?

Accelerating Vulnerability Management through SecDevOps

Investing in Fractal Protocol

{UPDATE} 八分音符酱,不要停!儿童游戏 Hack Free Resources Generator

{UPDATE} Logo Quiz - USA Brands Hack Free Resources Generator

{UPDATE} ein Fernseher Quad Fahrrad Ren Hack Free Resources Generator

Pinknode — We’re extending our LP Mining Program!

Who controls the Internet?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store

UpGuard — UpGuard combines third-party security ratings, vendor questionnaires, and threat intelligence in a single cyber risk solution.

More from Medium

Splunk Phantom REST API Filters

First step with elastic security

Intel Dev Cloud access via SSH for oneAPI