SlideShare a Scribd company logo
1 of 6
How a Leading Investment Firm
Assessed 3x More Vendors Than Before
Blackstone trusted CyberGRX to arm them with a modern third-
party cyber risk program. The result? A streamlined approach that
reduced resource spend by 50%, allowing Blackstone to
reallocate resources to true risk management, reduction, and
mitigation efforts - and that's not all.
The Company: Blackstone
Founded in 1985, Blackstone is one of
the world’s leading investment firms.
They seek to create positive economic
impact and long-term value for their
investors, the companies they invest in,
and the communities in which they work.
Blackstone has over 3,000 vendors
themselves, while their portfolio, which
includes over 100 companies, has tens of
thousands of vendors.
The Problem
With a steadily growing ecosystem of third
parties, Blackstone needed a streamlined,
scalable solution that could force-multiply their
third-party cyber risk management efforts.
They were onboarding 4 to 6 new vendors
every month, and static spreadsheets just
weren't cutting it.
Spreadsheet assessments and endless
phone tag couldn't keep up
Wasted time and resources
on tedious, manual tasks
Couldn't scale with vendor growth
Lack of shared insights
The Solution
CyberGRX’s dynamic assessments and advanced
analytics have enabled Blackstone to prioritize
critical areas of risk and allows them to have
informed, risk-based discussions with their vendors
and business partners.
Once a vendor completes an assessment on the
Exchange, it's kept up-to-date, shared with
approved partners, and significantly reduces the
waste and overlap of redundant assessment
requests between and among Blackstone and its
portfolio.
A new, game-changing approach
The Results
Blackstone assesses 3x the number of
vendors than previously assessed
Blackstone has been able to reduce the
resources allocated to their previously
inefficient assessment process, from 1 to
.5 FTE
Can now focus resources on true risk
management, reduction, and mitigation
efforts
"CyberGRX is a force multiplier for our
third-party cyber risk management
program. In just the first year, I
anticipate we will be able to assess 3x
more vendors than we assessed last
year and reallocate the resources
saved to true risk management and
mitigation efforts."
Adam Fletcher
Blackstone CISO
CyberGRX TPCRM Case Study - Blackstone

More Related Content

What's hot

Outlining a CCAR strategy beyond model development
Outlining a CCAR strategy beyond model developmentOutlining a CCAR strategy beyond model development
Outlining a CCAR strategy beyond model development
fawadb
 
Term project presentation
Term project presentationTerm project presentation
Term project presentation
scaines
 

What's hot (14)

Outlining a CCAR strategy beyond model development
Outlining a CCAR strategy beyond model developmentOutlining a CCAR strategy beyond model development
Outlining a CCAR strategy beyond model development
 
The cutting edge of Technology in Procurement - Presentation to the IIPMM (Ir...
The cutting edge of Technology in Procurement - Presentation to the IIPMM (Ir...The cutting edge of Technology in Procurement - Presentation to the IIPMM (Ir...
The cutting edge of Technology in Procurement - Presentation to the IIPMM (Ir...
 
Big Data: Expectations, Obstacles, and The Road to Greater Value
Big Data: Expectations, Obstacles, and The Road to Greater ValueBig Data: Expectations, Obstacles, and The Road to Greater Value
Big Data: Expectations, Obstacles, and The Road to Greater Value
 
Making Advanced Analytics Work for You
Making Advanced Analytics Work for You Making Advanced Analytics Work for You
Making Advanced Analytics Work for You
 
Big Plans for Big Data in the Public Sector Infographic
Big Plans for Big Data in the Public Sector InfographicBig Plans for Big Data in the Public Sector Infographic
Big Plans for Big Data in the Public Sector Infographic
 
Term project presentation
Term project presentationTerm project presentation
Term project presentation
 
Gillian Muessig - The next big thing in digital inbound marketing?
Gillian Muessig - The next big thing in digital inbound marketing?Gillian Muessig - The next big thing in digital inbound marketing?
Gillian Muessig - The next big thing in digital inbound marketing?
 
Marketing in the Time of the Internet of Things - Marketing Festival Brno 2013
Marketing in the Time of the Internet of Things - Marketing Festival Brno 2013Marketing in the Time of the Internet of Things - Marketing Festival Brno 2013
Marketing in the Time of the Internet of Things - Marketing Festival Brno 2013
 
500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS500 IT leaders weigh on on the state of DRaaS
500 IT leaders weigh on on the state of DRaaS
 
RSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management programRSA-Iceberg Seminar: Building an effective supplier risk management program
RSA-Iceberg Seminar: Building an effective supplier risk management program
 
Big Data SurVey - IOUG - 2013 - 594292
Big Data SurVey - IOUG - 2013 - 594292Big Data SurVey - IOUG - 2013 - 594292
Big Data SurVey - IOUG - 2013 - 594292
 
Big data
Big dataBig data
Big data
 
Making advanced analytics work for you
Making advanced analytics work for youMaking advanced analytics work for you
Making advanced analytics work for you
 
General Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance CompaniesGeneral Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance Companies
 

Similar to CyberGRX TPCRM Case Study - Blackstone

Disruption in Wealth Management
Disruption in Wealth ManagementDisruption in Wealth Management
Disruption in Wealth Management
Greg Simmons
 
Sutherland_Whitepaper_AB FINAL.PDF
Sutherland_Whitepaper_AB FINAL.PDFSutherland_Whitepaper_AB FINAL.PDF
Sutherland_Whitepaper_AB FINAL.PDF
Edward van Eckert
 
Virtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk AdvisorVirtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk Advisor
Grayline
 
SMA Perspective for LT - Underwriting 03-13-15 FINAL
SMA Perspective for LT - Underwriting 03-13-15 FINALSMA Perspective for LT - Underwriting 03-13-15 FINAL
SMA Perspective for LT - Underwriting 03-13-15 FINAL
Steven Levine
 
Beecher Carlson All Lines Presentation
Beecher Carlson All Lines PresentationBeecher Carlson All Lines Presentation
Beecher Carlson All Lines Presentation
Christopher Rieser
 

Similar to CyberGRX TPCRM Case Study - Blackstone (20)

How AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millionsHow AGCO implemented an Supply Chain Risk management solution to save millions
How AGCO implemented an Supply Chain Risk management solution to save millions
 
3+ Keys to Proactive Underwriting (1).pdf
3+ Keys to Proactive Underwriting (1).pdf3+ Keys to Proactive Underwriting (1).pdf
3+ Keys to Proactive Underwriting (1).pdf
 
Disruption in Wealth Management
Disruption in Wealth ManagementDisruption in Wealth Management
Disruption in Wealth Management
 
Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...Taking the road to advanced approaches and heightened standards in risk manag...
Taking the road to advanced approaches and heightened standards in risk manag...
 
Sutherland_Whitepaper_AB FINAL.PDF
Sutherland_Whitepaper_AB FINAL.PDFSutherland_Whitepaper_AB FINAL.PDF
Sutherland_Whitepaper_AB FINAL.PDF
 
2019-pwc-global-benchmarking-survey.pdf
2019-pwc-global-benchmarking-survey.pdf2019-pwc-global-benchmarking-survey.pdf
2019-pwc-global-benchmarking-survey.pdf
 
My slides
My slidesMy slides
My slides
 
Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...
 
Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics Frost&Sullivan Report: Business Analytics
Frost&Sullivan Report: Business Analytics
 
Quantifi newsletter Insight autumn 2015
Quantifi newsletter Insight autumn 2015Quantifi newsletter Insight autumn 2015
Quantifi newsletter Insight autumn 2015
 
Virtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk AdvisorVirtual Risk Officer / Virtual Risk Advisor
Virtual Risk Officer / Virtual Risk Advisor
 
Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008Enterprise Microsharing Tools Comparison 11032008
Enterprise Microsharing Tools Comparison 11032008
 
Analytics in Insurance Value Chain
Analytics in Insurance Value ChainAnalytics in Insurance Value Chain
Analytics in Insurance Value Chain
 
Top 8 Ways to Improve Underwriting Workflow
Top 8 Ways to Improve Underwriting WorkflowTop 8 Ways to Improve Underwriting Workflow
Top 8 Ways to Improve Underwriting Workflow
 
Book - BB Final
Book - BB  FinalBook - BB  Final
Book - BB Final
 
SMA Perspective for LT - Underwriting 03-13-15 FINAL
SMA Perspective for LT - Underwriting 03-13-15 FINALSMA Perspective for LT - Underwriting 03-13-15 FINAL
SMA Perspective for LT - Underwriting 03-13-15 FINAL
 
Cost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administrationCost vs. Risk: Finding the right balance for hedge fund administration
Cost vs. Risk: Finding the right balance for hedge fund administration
 
Beecher Carlson All Lines Presentation
Beecher Carlson All Lines PresentationBeecher Carlson All Lines Presentation
Beecher Carlson All Lines Presentation
 
Unlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial UnderwritingUnlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial Underwriting
 
PVS Intro For Partners Q3 2010
PVS Intro For Partners Q3 2010PVS Intro For Partners Q3 2010
PVS Intro For Partners Q3 2010
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 

CyberGRX TPCRM Case Study - Blackstone

  • 1. How a Leading Investment Firm Assessed 3x More Vendors Than Before Blackstone trusted CyberGRX to arm them with a modern third- party cyber risk program. The result? A streamlined approach that reduced resource spend by 50%, allowing Blackstone to reallocate resources to true risk management, reduction, and mitigation efforts - and that's not all.
  • 2. The Company: Blackstone Founded in 1985, Blackstone is one of the world’s leading investment firms. They seek to create positive economic impact and long-term value for their investors, the companies they invest in, and the communities in which they work. Blackstone has over 3,000 vendors themselves, while their portfolio, which includes over 100 companies, has tens of thousands of vendors.
  • 3. The Problem With a steadily growing ecosystem of third parties, Blackstone needed a streamlined, scalable solution that could force-multiply their third-party cyber risk management efforts. They were onboarding 4 to 6 new vendors every month, and static spreadsheets just weren't cutting it. Spreadsheet assessments and endless phone tag couldn't keep up Wasted time and resources on tedious, manual tasks Couldn't scale with vendor growth Lack of shared insights
  • 4. The Solution CyberGRX’s dynamic assessments and advanced analytics have enabled Blackstone to prioritize critical areas of risk and allows them to have informed, risk-based discussions with their vendors and business partners. Once a vendor completes an assessment on the Exchange, it's kept up-to-date, shared with approved partners, and significantly reduces the waste and overlap of redundant assessment requests between and among Blackstone and its portfolio. A new, game-changing approach
  • 5. The Results Blackstone assesses 3x the number of vendors than previously assessed Blackstone has been able to reduce the resources allocated to their previously inefficient assessment process, from 1 to .5 FTE Can now focus resources on true risk management, reduction, and mitigation efforts "CyberGRX is a force multiplier for our third-party cyber risk management program. In just the first year, I anticipate we will be able to assess 3x more vendors than we assessed last year and reallocate the resources saved to true risk management and mitigation efforts." Adam Fletcher Blackstone CISO

Editor's Notes

  1. Completed August 2019