SlideShare a Scribd company logo
Sean O’Brien, Director, DVV Solutions
sobrien@dvvs.co.uk
Third Party Risk Management in the UK
2 Private and Confidential © Copyright 2019www.dvvs.co.uk
The Third Party Risks Are Real
380,000 PII and PCI Records stolen by Magecart
Primary incident took place over two weeks in August 2018
40,000 PII & PCI Records - June 2018
Inbenta Technologies - Third Party Customer Support App
70,000 PII records of potential offenders - January 2019
ElasticSearch server – Third Party Platform Service
3 Private and Confidential © Copyright 2019www.dvvs.co.uk
Oversight &
Governance
Third Party
Inventory
Risk Approach
& Models
Policies &
Standards
TPRM
Processes
Technology,
Automation &
Reporting
Third Party
Risk
Management
Enterprise Risk Management
Framework
4 Private and Confidential © Copyright 2019www.dvvs.co.uk
Defining Third Party Due Diligence
What is a Third Party?
What is the breadth of Third Party Risk?
Key elements of a Third Party Risk Assessment process:
Onsite Assessment
Remote Assessment
(Questionnaire/Attestation)
Risk Advisory &
Remediation Tracking
Continuous Monitoring
5 Private and Confidential © Copyright 2019www.dvvs.co.uk
Know Your 3rd Parties….
Scope:
Q. Do you have a comprehensive list of ALL 3rd Parties, the services they
provide and a risk register/rating for each one?
Q. What access do 3rd Parties have to data/systems/applications?
Do they really need it?
Q. What PII, Sensitive and Mission-Critical data storage and processing is
outsourced by your 3rd Parties – to nth Parties?
Q. What % of your data processing is performed Internally v Externally?
Appetite:
Q. Is your spend on 3rd Party risk and compliance proportional?
6 Private and Confidential © Copyright 2019www.dvvs.co.uk
Regulatory Drivers
7 Private and Confidential © Copyright 2019www.dvvs.co.uk
Increasing Regulatory Pressure
Existing regulation in support of building “Operational Resilience”:
“Boards’ and senior managements’ oversight also needs to cover any activities outsourced to third-
party providers... While outsourcing can enable firms and FMIs to manage risks more effectively and
at a reduced cost, it can also give rise to new risks for which they remain responsible.“
BoE Discussion Paper DPO1/18, Jul 2018
GDPR and the data supply chain:
“Controllers…must only appoint Processors who can provide ‘sufficient guarantees’ that the
requirements of the GDPR will be met… Controller also has a duty to ensure the Processor’s security
arrangements are at least equivalent to the security the Controller would be required to have..”
ico.org.uk
Senior Managers and Certification Regime (SM&CR):
“The strengthening accountability regimes for banking and insurance help to support a change in
culture at all levels…. A new set of Conduct Rules applying to banking and Solvency II firms that
includes the responsibility of senior managers for oversight of any delegated activities.”
fca.org.uk
8 Private and Confidential © Copyright 2019www.dvvs.co.uk
TPRM State Of The Nation
Deployments - De-centralised, Centralised and Federated
Stakeholders - Historically Procurement, as they have become more risk orientated
- Contracts/Legal
- CISO/Cyber
- Governance/Compliance Teams
- New drivers from GDPR around Privacy and the emergence of the BISO role
- SMCR driving CIRO role
Assessments - Excel & Email, Manual, Limited automation, Self built (maybe ISO based), Q&A
Onsites - Coffee and Donuts, Peer to Peer Management meetings
Inefficiencies - 60% of a remote assessors time is spent on admin
- Limited frameworks in place
- Risk ownership
- Poor level of Standardisation – from business to business, sector to sector
What is the Tone at the Top?
9 Private and Confidential © Copyright 2019www.dvvs.co.uk
Tone At The Top - Vendor Risk Management Benchmark Study
Key takeaways from 2018/2019 SA Study and other recent research
Fully 57% of organisations responding high board engagement had mature TPRM programs while
more than half of organisations with low board engagement levels had significantly underperforming program
Governance
55% of organisations reporting high board engagement had mature TPRM programs;
52% of organisations with low board engagement levels had seriously underperforming programs.
Policies Standards, and Procedures
57% of organisations reporting high board engagement had mature TPRM programs;
47% of organisations with low board engagement levels had seriously underperforming programs.
Contract Development, Adherence and Management
57% of organisations reporting high board engagement had mature TPRM programs;
50% of organisations with low board engagement levels had seriously underperforming programs.
Vendor Risk Assessment Process
57% of organisations reporting high board engagement had mature TPRM programs;
50% of organisations with low board engagement levels had seriously underperforming programs.
10 Private and Confidential © Copyright 2019www.dvvs.co.uk
Key takeaways from 2018/2019 SA Study and other recent research
Skills and Expertise
56% of organisations reporting high board engagement had mature TPRM programs;
52% of organisations with low board engagement levels had seriously underperforming programs.
Communication and Information Sharing
56% of organisations reporting high board engagement had mature TPRM programs;
51% of organisations with low board engagement levels had seriously underperforming programs.
Tools, Measurement and Analysis
58% of organisations reporting high board engagement had mature TPRM programs;
53% of organisations with low board engagement levels had seriously underperforming programs.
Monitoring and Review
58% of organisations reporting high board engagement had mature TPRM programs;
51% of organisations with low board engagement levels had seriously underperforming programs.
In short… organisations with Highly engaged boards consistently post Higher practice maturity scores!
Tone At The Top - Vendor Risk Management Benchmark Study
11 Private and Confidential © Copyright 2019www.dvvs.co.uk
Defining and Driving Standards & Best Practices
The Shared Assessments Program, the trusted source in third party risk assurance, is a member-driven, standards body with
tools and best practices that inject speed, consistency, efficiency and cost savings into the control assessment process.
Thought Leadership
− Members work to eliminate redundancies and create efficiencies,
for a faster, more rigorous, more efficient, and less costly means
of conducting vendor assessments.
TPRM Toolkit
− Vendor Risk Management Maturity Model (VRMMM)
− Standardised Information Gathering (SIG) Questionnaire
− Standardised Control Assessment (SCA)
− GDPR Processor Privacy Toolkit
Certification
− Certified Third Party Risk Professional (CTPRP)
− Certified Third Party Risk Assessor (CTPRA)
− Certified Third Party Risk Manager (CTPRM) 2020!
12 Private and Confidential © Copyright 2019www.dvvs.co.uk
Where Are We Going?
Growing pressure on the content, quality and governance of Third Party risk throughout the organisation
Drivers both up and down the supply chain
More formal TPRM frameworks, aligned to ERM required
Increased Automation and Workflow
Collaborative, “Assess Once, Share Many” models
13 Private and Confidential © Copyright 2019www.dvvs.co.uk
Building The Foundations
Policies
Procedures
Standards
14 Private and Confidential © Copyright 2019www.dvvs.co.uk
Risk Assessment Inefficiencies
50%-60% of Time Taken in Risk Assessment is spent on Administration
− Planning & Scheduling
− Sending emails & Chasing Responses and Updates with Suppliers
− Understanding & Interpreting Responses
− Collating Data & Building Metrics
− Generating Reports
− Overlap and Repetition with other teams
− Poor Audit Trail
Consider the Typical Head and Management Cost……
15 Private and Confidential © Copyright 2019www.dvvs.co.uk
Typical UK Manual Questionnaire
Content
• Usually 80-100 Questions
• Based on ISO 27002 or specific historic issue/requirement
• Each question may be made up of multiple questions
• English word answers required
Common issues with “home grown” questionnaires: -
• Questions poorly worded and easily mis-interpreted
• Can miss key security control areas
• High overhead to maintain and improve the questionnaire to keep abreast of current legislation/regulation
• Answers open to interpretation, often requiring additional feedback/investigation - less valuable as an attestation
16 Private and Confidential © Copyright 2019www.dvvs.co.uk
Shared Assessments Program – Trust, but Verify
17 Private and Confidential © Copyright 2019www.dvvs.co.uk
Standardised Information Gathering (SIG) Questionnaire
• Member-driven questionnaire sets and procedure
• SIG Master, SIG Core, SIG Lite
• Automated analysis and scoring to quickly identify, prioritise and remediate issues
• Reviewed annually with updates and revision based on referenced industry regulation, guidelines and standard including:
• NIST, FFIEC, ISO, HIPAA, PCI, GDPR
• 18 Risk Control areas or “Domains” are assessed in one document:
• Operations Management
• Access Control
• Application Security
• Incident Event and Comms Mgmt
• Business Resiliency
• Compliance
• End User Device Security
• Network Security
• Privacy
• Threat Mgmt
• Service Security
• Cloud Hosting
• Risk Assessment and Treatment
• Security Policy
• Organisation Security
• Asset and Information Mgmt
• Human Resources Security
• Physical and Environmental Security
18 Private and Confidential © Copyright 2019www.dvvs.co.uk
Question Comparison: Typical vs. SIG
19 Private and Confidential © Copyright 2019www.dvvs.co.uk
Independent customer questionnaire
Based on answering approximately 100 Questions
Time taken to complete questionnaire,
with evidence provided
Time taken to review and score
completed questionnaire
No. of Controls Assessed
(In accordance with SCA)
12 hours with evidence 8 hours 35
0
2
4
6
8
10
12
14
16
18
20
Overall Control Status
In Place High Impact Moderate Impact Low Impact
Domain Name Total In Place Findings High Impact
Moderate
Impact
Low Impact N/A
A. Risk Assessment and Treatment 1 0 1 1
B. Security Policy 1 1 0
C. Organizational Security 1 1 0
D. Asset and Information Management 3 2 1 1
E. Human Resources Security 4 3 1 1
F. Physical and Environmental Security 5 1 4 2 2 1
G. Operations Management 2 0 2 1 1
H. Access Control 6 4 2 2
I. Application Security 1 1 0
J. Incident Event & Communications Mgt 2 2 0
K. Business Resiliency 2 0 2 2
L. Compliance 0 0 0
M. End User Device Security 0 0 0
N. Network Security 2 2 0
P. Privacy 1 1 0
T. Threat Management 2 1 1 1
U. Server Security 1 1 0
V. Cloud Hosting 1 1 0
Total 35 21 14 3 6 5 1
% of Controls In Place 60%
20 Private and Confidential © Copyright 2019www.dvvs.co.uk
Shared Assessments SIG Lite customer questionnaire
Based on answering 77 Parent questions and then depending on the response up to 328 questions in total
Time taken to complete questionnaire,
with evidence provided
Time taken to review and score completed
questionnaire with a Master SIG completed
No. of Controls Assessed (In
accordance with SCA)
16 hours with evidence 2 hour 136
0
2
4
6
8
10
12
14
16
18
20
Overall Control Status
In Place High Impact Moderate Impact Low Impact
Domain Name Total In Place Findings
High
Impact
Moderate
Impact
Low
Impact
N/A
A. Risk Assessment and Treatment 12 9 3 1 1 1
B. Security Policy 2 2 0
C. Organizational Security 1 1 0
D. Asset and Information Management 9 9 0
E. Human Resources Security 5 5 0
F. Physical and Environmental Security 9 9 0
G. Operations Management 8 7 1 1
H. Access Control 13 13 0
I. Application Security 20 20 0
J. Incident Event & Communications Mgt 11 11 0
K. Business Resiliency 8 2 6 2 4
L. Compliance 4 2 2 1 1
M. End User Device Security 2 2 0
N. Network Security 11 9 2 2
P. Privacy 10 4 6 4 2 3
T. Threat Management 6 5 1 1
U. Server Security 1 1 0
V. Cloud Hosting 4 2 2 2
Total 136 113 23 4 12 7 3
% of Controls In Place 83%
21 Private and Confidential © Copyright 2019www.dvvs.co.uk
Observations
Time for Supplier to
complete
Time Taken for Review No. of Security Controls
Assessed
SIG 16 hours with evidence 2 hours 76
None SIG 12 hours with
evidence
8 hours 35
• Customers are frequently concerned that using SIG or SIG Lite represents considerably more questions and
Suppliers will frequently be put off, as they think it will take much longer.
• While the SIG took longer for the Supplier to complete we were asking considerably more questions and covering
a much larger number security controls.
• However, effort on the part of the Customer is significantly reduced both in time to assess and report and in
maintaining an up to date questionnaire.
• It should be noted that when the Supplier comes to complete the SIG/SIG-Lite the following year, all they will
have to do is update anything that has changed.
22 Private and Confidential © Copyright 2019www.dvvs.co.uk
Onsite Assessment Process
Common issues
• Separate process/procedure to the remote assessment
• Poor or non-existent assessment audit log
• Inconsistent or missing metrics
• Overly time consuming to report on
• Reporting positives and negatives, NOT findings
• Resulting in increased man hours to undertake, assess and report
In a “Trust, but Verify” model, the Onsite assessment process should validate the statements made in the completed questionnaire
• Questionnaire should map to the onsite assessment and utilising the same metrics
• Questionnaires, previous assessments and Continuous Monitoring output should provide scope for the onsite assessment
• Onsite should identify Control Gaps, where a Policy or Procedure is not carried out in Practice
• Output from an Onsite Assessment should be: -
• Assessment Audit Log
• Findings Rep
23 Private and Confidential © Copyright 2019www.dvvs.co.uk
Standardised Controls Assessment (SCA)
The “Verify” part of the “Trust, but Verify” Shared Assessments model
A holistic tool for performing standardised onsite and/or virtual risk management control assessments
A robust, consistent, repeatable assessment methodology, usable by:
• Organisations who want to perform a self-assessment
• Organisation who want perform and industry standard assessment on their third parties
• Any in-house audit or assessment team
• Any independent assessment firms
Test procedures, a control framework, reporting templates and engagement criteria to support assessments
Substantiation-based, not opinion-based
• The presence of a control is tested by evaluating attributes that define the control
• An opinion would require a more in-depth audit and effectiveness criteria
• This allows a faster execution and facilitates sharing
24 Private and Confidential © Copyright 2019www.dvvs.co.uk
Standardisation – Goals for Clients and their Third Parties
Work collaboratively with other companies
through industry associations and public-private partnerships with outsourcers and vendors.
Improve Tone at the Top
to break down internal silos, so that TPRM efforts can be more effectively coordinated.
Form, build and sustain cooperative relationships within companies
to effectively span the alignment challenges presented by organisational silos.
Utilise industry-designed, standardised tools
to streamline information sharing where appropriate and improve efficiency/effectiveness throughout the TPRM
lifecycle.
Build critical mass within the TPRM ecosystem
using common controls, tools and practices, in order to reduce assessment overhead and improve risk management.
25 Private and Confidential © Copyright 2019www.dvvs.co.uk
Keeping Score and Measuring Success
Third Party Program Metrics
• Quantity of Assessment by Risk Tier
• Quantity at current or through stage gates
• Open Findings/Remediation Expectations
• Assessors Assignments
Budgeting
• Average cost of an assessment (by tier)
• External assessment budget
• Travel Costs
• Personnel
• Training
26 Private and Confidential © Copyright 2019www.dvvs.co.uk
How Can I Evaluate SIG?
DVV Solutions offer an economical SIG Evaluation Service.
A Shared Assessments Certified Third Party Risk Professional provides a detailed look at SIG tooling:-
Hands-on walk through of SIG tooling and processes
Cross-map your current questionnaire to the SIG-LITE questionnaire set
Identify any current risk domain and control gaps
Recommend where incorporating SIG could enhance your current processes
27 Private and Confidential © Copyright 2019www.dvvs.co.uk
Managed Services
What Value Can a Managed Service Provider (MSP) like DVV Solutions Bring to TPRM?
• Experience….DVV Solutions has built and run multiple TPRM frameworks for customers
• As already discussed….Methodology and standards already in place, therefore time to value is significantly reduced
• No need to purchase and manage a TPRM platform, including SIG/SCA
• Scalability and flexibility of resources
• Accredited Assessors
• Free up your own resource to undertake more valuable tasks like reviewing findings and assessing risks
28 Private and Confidential © Copyright 2019www.dvvs.co.uk
Questions?
29 Private and Confidential © Copyright 2019www.dvvs.co.uk
You’re only as strong as your weakest link

More Related Content

What's hot

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
NICSA
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
Colleen Beck-Domanico
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
SALIH AHMED ISLAM
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
DevOps.com
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
Frederic Girardeau-Montaut
 
third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
SALIH AHMED ISLAM
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
CompTIA
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
ControlCase
 
TI Managing Third Party Risk
TI Managing Third Party RiskTI Managing Third Party Risk
TI Managing Third Party Risk
The Business Council of Mongolia
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
Aladdin Dandis
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
Rocket Matter, LLC
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
Abhishek Sood
 
IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler   IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler
Hernan Huwyler, MBA CPA
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
Marie Peters
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
EDR
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Resolver Inc.
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
Transcendent Group
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-program
Charles Steve
 
Presentation_IA Focus
Presentation_IA FocusPresentation_IA Focus
Presentation_IA Focus
saurav Chandgothia
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions Consulting
Andrew Topa
 

What's hot (20)

Third-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in OversightThird-Party Risk Management: A Case Study in Oversight
Third-Party Risk Management: A Case Study in Oversight
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
 
A compliance officer's guide to third party risk management
A compliance officer's guide to third party risk managementA compliance officer's guide to third party risk management
A compliance officer's guide to third party risk management
 
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk ManagementProtect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
third party risk management best practices
third party risk management best practicesthird party risk management best practices
third party risk management best practices
 
Trends in Information Security
Trends in Information SecurityTrends in Information Security
Trends in Information Security
 
Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1Vendor risk management webinar 10022019 v1
Vendor risk management webinar 10022019 v1
 
TI Managing Third Party Risk
TI Managing Third Party RiskTI Managing Third Party Risk
TI Managing Third Party Risk
 
Ch3 cism 2014
Ch3 cism 2014Ch3 cism 2014
Ch3 cism 2014
 
Cybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm Data
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler   IE Corporate Risk Assessment 1-6 - Hernan huwyler
IE Corporate Risk Assessment 1-6 - Hernan huwyler
 
managed-services-buying-guide
managed-services-buying-guidemanaged-services-buying-guide
managed-services-buying-guide
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
Why does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-programWhy does-your-company-need-a-third-party-risk-management-program
Why does-your-company-need-a-third-party-risk-management-program
 
Presentation_IA Focus
Presentation_IA FocusPresentation_IA Focus
Presentation_IA Focus
 
Weaver - Financial Institutions Consulting
Weaver - Financial Institutions ConsultingWeaver - Financial Institutions Consulting
Weaver - Financial Institutions Consulting
 

Similar to Standards in Third Party Risk - DVV Solutions ISACA North May 19

Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
OnRamp
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
TrustArc
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
Taiye Lambo
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
Capgemini
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor Management
TrustArc
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
May Martinsen
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
Precisely
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
NICSA
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
Christian F. Nissen
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
Amit Bhargava
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
Capgemini
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
Marc St-Pierre
 
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinnTech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
Events2018
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
Skoda Minotti
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Health Catalyst
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
FERMA
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear LLC
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
EnterpriseGRC Solutions, Inc.
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
Stacy Willis
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
Marko Suswanto
 

Similar to Standards in Third Party Risk - DVV Solutions ISACA North May 19 (20)

Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant2019 06-19 convince customerspartnersboard gdpr-compliant
2019 06-19 convince customerspartnersboard gdpr-compliant
 
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
{d1a164b5-f3a5-4840-96b1-16dd83ccdda9}_Wells_Fargo_GIB_Cyber_security_100615_...
 
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) planCWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
CWIN17 san francisco-geert vanderlinden-don't be stranded without a (gdpr) plan
 
Feb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor ManagementFeb20 Webinar - Managing Risk and Pain of Vendor Management
Feb20 Webinar - Managing Risk and Pain of Vendor Management
 
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTESINITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
INITIAL COMPLIANCE APPROVAL IN JUST 2 MINUTES
 
Get Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security SolutionGet Ready for Syncsort's New Best-of-Breed Security Solution
Get Ready for Syncsort's New Best-of-Breed Security Solution
 
Third-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a StrategyThird-Party Risk Management: Implementing a Strategy
Third-Party Risk Management: Implementing a Strategy
 
Introduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber ResilienceIntroduction to RESILIA and Cyber Resilience
Introduction to RESILIA and Cyber Resilience
 
Enterprise policy-management
Enterprise policy-managementEnterprise policy-management
Enterprise policy-management
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Digital Ethical Risk Assessment
Digital Ethical Risk AssessmentDigital Ethical Risk Assessment
Digital Ethical Risk Assessment
 
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinnTech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
Tech Connect Live 30th May 2018 ,GDPR Summit Anne quinn
 
New Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law RequirementsNew Ohio Cybersecurity Law Requirements
New Ohio Cybersecurity Law Requirements
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
Cybersecurity mitigation strategies webinar AIG ecoDa FERMA 24 March 2016
 
Maclear’s IT GRC Tools – Key Issues and Trends
Maclear’s  IT GRC Tools – Key Issues and TrendsMaclear’s  IT GRC Tools – Key Issues and Trends
Maclear’s IT GRC Tools – Key Issues and Trends
 
Enterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slidesEnterprise governance risk_compliance_fcm slides
Enterprise governance risk_compliance_fcm slides
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 

Standards in Third Party Risk - DVV Solutions ISACA North May 19

  • 1. Sean O’Brien, Director, DVV Solutions sobrien@dvvs.co.uk Third Party Risk Management in the UK
  • 2. 2 Private and Confidential © Copyright 2019www.dvvs.co.uk The Third Party Risks Are Real 380,000 PII and PCI Records stolen by Magecart Primary incident took place over two weeks in August 2018 40,000 PII & PCI Records - June 2018 Inbenta Technologies - Third Party Customer Support App 70,000 PII records of potential offenders - January 2019 ElasticSearch server – Third Party Platform Service
  • 3. 3 Private and Confidential © Copyright 2019www.dvvs.co.uk Oversight & Governance Third Party Inventory Risk Approach & Models Policies & Standards TPRM Processes Technology, Automation & Reporting Third Party Risk Management Enterprise Risk Management Framework
  • 4. 4 Private and Confidential © Copyright 2019www.dvvs.co.uk Defining Third Party Due Diligence What is a Third Party? What is the breadth of Third Party Risk? Key elements of a Third Party Risk Assessment process: Onsite Assessment Remote Assessment (Questionnaire/Attestation) Risk Advisory & Remediation Tracking Continuous Monitoring
  • 5. 5 Private and Confidential © Copyright 2019www.dvvs.co.uk Know Your 3rd Parties…. Scope: Q. Do you have a comprehensive list of ALL 3rd Parties, the services they provide and a risk register/rating for each one? Q. What access do 3rd Parties have to data/systems/applications? Do they really need it? Q. What PII, Sensitive and Mission-Critical data storage and processing is outsourced by your 3rd Parties – to nth Parties? Q. What % of your data processing is performed Internally v Externally? Appetite: Q. Is your spend on 3rd Party risk and compliance proportional?
  • 6. 6 Private and Confidential © Copyright 2019www.dvvs.co.uk Regulatory Drivers
  • 7. 7 Private and Confidential © Copyright 2019www.dvvs.co.uk Increasing Regulatory Pressure Existing regulation in support of building “Operational Resilience”: “Boards’ and senior managements’ oversight also needs to cover any activities outsourced to third- party providers... While outsourcing can enable firms and FMIs to manage risks more effectively and at a reduced cost, it can also give rise to new risks for which they remain responsible.“ BoE Discussion Paper DPO1/18, Jul 2018 GDPR and the data supply chain: “Controllers…must only appoint Processors who can provide ‘sufficient guarantees’ that the requirements of the GDPR will be met… Controller also has a duty to ensure the Processor’s security arrangements are at least equivalent to the security the Controller would be required to have..” ico.org.uk Senior Managers and Certification Regime (SM&CR): “The strengthening accountability regimes for banking and insurance help to support a change in culture at all levels…. A new set of Conduct Rules applying to banking and Solvency II firms that includes the responsibility of senior managers for oversight of any delegated activities.” fca.org.uk
  • 8. 8 Private and Confidential © Copyright 2019www.dvvs.co.uk TPRM State Of The Nation Deployments - De-centralised, Centralised and Federated Stakeholders - Historically Procurement, as they have become more risk orientated - Contracts/Legal - CISO/Cyber - Governance/Compliance Teams - New drivers from GDPR around Privacy and the emergence of the BISO role - SMCR driving CIRO role Assessments - Excel & Email, Manual, Limited automation, Self built (maybe ISO based), Q&A Onsites - Coffee and Donuts, Peer to Peer Management meetings Inefficiencies - 60% of a remote assessors time is spent on admin - Limited frameworks in place - Risk ownership - Poor level of Standardisation – from business to business, sector to sector What is the Tone at the Top?
  • 9. 9 Private and Confidential © Copyright 2019www.dvvs.co.uk Tone At The Top - Vendor Risk Management Benchmark Study Key takeaways from 2018/2019 SA Study and other recent research Fully 57% of organisations responding high board engagement had mature TPRM programs while more than half of organisations with low board engagement levels had significantly underperforming program Governance 55% of organisations reporting high board engagement had mature TPRM programs; 52% of organisations with low board engagement levels had seriously underperforming programs. Policies Standards, and Procedures 57% of organisations reporting high board engagement had mature TPRM programs; 47% of organisations with low board engagement levels had seriously underperforming programs. Contract Development, Adherence and Management 57% of organisations reporting high board engagement had mature TPRM programs; 50% of organisations with low board engagement levels had seriously underperforming programs. Vendor Risk Assessment Process 57% of organisations reporting high board engagement had mature TPRM programs; 50% of organisations with low board engagement levels had seriously underperforming programs.
  • 10. 10 Private and Confidential © Copyright 2019www.dvvs.co.uk Key takeaways from 2018/2019 SA Study and other recent research Skills and Expertise 56% of organisations reporting high board engagement had mature TPRM programs; 52% of organisations with low board engagement levels had seriously underperforming programs. Communication and Information Sharing 56% of organisations reporting high board engagement had mature TPRM programs; 51% of organisations with low board engagement levels had seriously underperforming programs. Tools, Measurement and Analysis 58% of organisations reporting high board engagement had mature TPRM programs; 53% of organisations with low board engagement levels had seriously underperforming programs. Monitoring and Review 58% of organisations reporting high board engagement had mature TPRM programs; 51% of organisations with low board engagement levels had seriously underperforming programs. In short… organisations with Highly engaged boards consistently post Higher practice maturity scores! Tone At The Top - Vendor Risk Management Benchmark Study
  • 11. 11 Private and Confidential © Copyright 2019www.dvvs.co.uk Defining and Driving Standards & Best Practices The Shared Assessments Program, the trusted source in third party risk assurance, is a member-driven, standards body with tools and best practices that inject speed, consistency, efficiency and cost savings into the control assessment process. Thought Leadership − Members work to eliminate redundancies and create efficiencies, for a faster, more rigorous, more efficient, and less costly means of conducting vendor assessments. TPRM Toolkit − Vendor Risk Management Maturity Model (VRMMM) − Standardised Information Gathering (SIG) Questionnaire − Standardised Control Assessment (SCA) − GDPR Processor Privacy Toolkit Certification − Certified Third Party Risk Professional (CTPRP) − Certified Third Party Risk Assessor (CTPRA) − Certified Third Party Risk Manager (CTPRM) 2020!
  • 12. 12 Private and Confidential © Copyright 2019www.dvvs.co.uk Where Are We Going? Growing pressure on the content, quality and governance of Third Party risk throughout the organisation Drivers both up and down the supply chain More formal TPRM frameworks, aligned to ERM required Increased Automation and Workflow Collaborative, “Assess Once, Share Many” models
  • 13. 13 Private and Confidential © Copyright 2019www.dvvs.co.uk Building The Foundations Policies Procedures Standards
  • 14. 14 Private and Confidential © Copyright 2019www.dvvs.co.uk Risk Assessment Inefficiencies 50%-60% of Time Taken in Risk Assessment is spent on Administration − Planning & Scheduling − Sending emails & Chasing Responses and Updates with Suppliers − Understanding & Interpreting Responses − Collating Data & Building Metrics − Generating Reports − Overlap and Repetition with other teams − Poor Audit Trail Consider the Typical Head and Management Cost……
  • 15. 15 Private and Confidential © Copyright 2019www.dvvs.co.uk Typical UK Manual Questionnaire Content • Usually 80-100 Questions • Based on ISO 27002 or specific historic issue/requirement • Each question may be made up of multiple questions • English word answers required Common issues with “home grown” questionnaires: - • Questions poorly worded and easily mis-interpreted • Can miss key security control areas • High overhead to maintain and improve the questionnaire to keep abreast of current legislation/regulation • Answers open to interpretation, often requiring additional feedback/investigation - less valuable as an attestation
  • 16. 16 Private and Confidential © Copyright 2019www.dvvs.co.uk Shared Assessments Program – Trust, but Verify
  • 17. 17 Private and Confidential © Copyright 2019www.dvvs.co.uk Standardised Information Gathering (SIG) Questionnaire • Member-driven questionnaire sets and procedure • SIG Master, SIG Core, SIG Lite • Automated analysis and scoring to quickly identify, prioritise and remediate issues • Reviewed annually with updates and revision based on referenced industry regulation, guidelines and standard including: • NIST, FFIEC, ISO, HIPAA, PCI, GDPR • 18 Risk Control areas or “Domains” are assessed in one document: • Operations Management • Access Control • Application Security • Incident Event and Comms Mgmt • Business Resiliency • Compliance • End User Device Security • Network Security • Privacy • Threat Mgmt • Service Security • Cloud Hosting • Risk Assessment and Treatment • Security Policy • Organisation Security • Asset and Information Mgmt • Human Resources Security • Physical and Environmental Security
  • 18. 18 Private and Confidential © Copyright 2019www.dvvs.co.uk Question Comparison: Typical vs. SIG
  • 19. 19 Private and Confidential © Copyright 2019www.dvvs.co.uk Independent customer questionnaire Based on answering approximately 100 Questions Time taken to complete questionnaire, with evidence provided Time taken to review and score completed questionnaire No. of Controls Assessed (In accordance with SCA) 12 hours with evidence 8 hours 35 0 2 4 6 8 10 12 14 16 18 20 Overall Control Status In Place High Impact Moderate Impact Low Impact Domain Name Total In Place Findings High Impact Moderate Impact Low Impact N/A A. Risk Assessment and Treatment 1 0 1 1 B. Security Policy 1 1 0 C. Organizational Security 1 1 0 D. Asset and Information Management 3 2 1 1 E. Human Resources Security 4 3 1 1 F. Physical and Environmental Security 5 1 4 2 2 1 G. Operations Management 2 0 2 1 1 H. Access Control 6 4 2 2 I. Application Security 1 1 0 J. Incident Event & Communications Mgt 2 2 0 K. Business Resiliency 2 0 2 2 L. Compliance 0 0 0 M. End User Device Security 0 0 0 N. Network Security 2 2 0 P. Privacy 1 1 0 T. Threat Management 2 1 1 1 U. Server Security 1 1 0 V. Cloud Hosting 1 1 0 Total 35 21 14 3 6 5 1 % of Controls In Place 60%
  • 20. 20 Private and Confidential © Copyright 2019www.dvvs.co.uk Shared Assessments SIG Lite customer questionnaire Based on answering 77 Parent questions and then depending on the response up to 328 questions in total Time taken to complete questionnaire, with evidence provided Time taken to review and score completed questionnaire with a Master SIG completed No. of Controls Assessed (In accordance with SCA) 16 hours with evidence 2 hour 136 0 2 4 6 8 10 12 14 16 18 20 Overall Control Status In Place High Impact Moderate Impact Low Impact Domain Name Total In Place Findings High Impact Moderate Impact Low Impact N/A A. Risk Assessment and Treatment 12 9 3 1 1 1 B. Security Policy 2 2 0 C. Organizational Security 1 1 0 D. Asset and Information Management 9 9 0 E. Human Resources Security 5 5 0 F. Physical and Environmental Security 9 9 0 G. Operations Management 8 7 1 1 H. Access Control 13 13 0 I. Application Security 20 20 0 J. Incident Event & Communications Mgt 11 11 0 K. Business Resiliency 8 2 6 2 4 L. Compliance 4 2 2 1 1 M. End User Device Security 2 2 0 N. Network Security 11 9 2 2 P. Privacy 10 4 6 4 2 3 T. Threat Management 6 5 1 1 U. Server Security 1 1 0 V. Cloud Hosting 4 2 2 2 Total 136 113 23 4 12 7 3 % of Controls In Place 83%
  • 21. 21 Private and Confidential © Copyright 2019www.dvvs.co.uk Observations Time for Supplier to complete Time Taken for Review No. of Security Controls Assessed SIG 16 hours with evidence 2 hours 76 None SIG 12 hours with evidence 8 hours 35 • Customers are frequently concerned that using SIG or SIG Lite represents considerably more questions and Suppliers will frequently be put off, as they think it will take much longer. • While the SIG took longer for the Supplier to complete we were asking considerably more questions and covering a much larger number security controls. • However, effort on the part of the Customer is significantly reduced both in time to assess and report and in maintaining an up to date questionnaire. • It should be noted that when the Supplier comes to complete the SIG/SIG-Lite the following year, all they will have to do is update anything that has changed.
  • 22. 22 Private and Confidential © Copyright 2019www.dvvs.co.uk Onsite Assessment Process Common issues • Separate process/procedure to the remote assessment • Poor or non-existent assessment audit log • Inconsistent or missing metrics • Overly time consuming to report on • Reporting positives and negatives, NOT findings • Resulting in increased man hours to undertake, assess and report In a “Trust, but Verify” model, the Onsite assessment process should validate the statements made in the completed questionnaire • Questionnaire should map to the onsite assessment and utilising the same metrics • Questionnaires, previous assessments and Continuous Monitoring output should provide scope for the onsite assessment • Onsite should identify Control Gaps, where a Policy or Procedure is not carried out in Practice • Output from an Onsite Assessment should be: - • Assessment Audit Log • Findings Rep
  • 23. 23 Private and Confidential © Copyright 2019www.dvvs.co.uk Standardised Controls Assessment (SCA) The “Verify” part of the “Trust, but Verify” Shared Assessments model A holistic tool for performing standardised onsite and/or virtual risk management control assessments A robust, consistent, repeatable assessment methodology, usable by: • Organisations who want to perform a self-assessment • Organisation who want perform and industry standard assessment on their third parties • Any in-house audit or assessment team • Any independent assessment firms Test procedures, a control framework, reporting templates and engagement criteria to support assessments Substantiation-based, not opinion-based • The presence of a control is tested by evaluating attributes that define the control • An opinion would require a more in-depth audit and effectiveness criteria • This allows a faster execution and facilitates sharing
  • 24. 24 Private and Confidential © Copyright 2019www.dvvs.co.uk Standardisation – Goals for Clients and their Third Parties Work collaboratively with other companies through industry associations and public-private partnerships with outsourcers and vendors. Improve Tone at the Top to break down internal silos, so that TPRM efforts can be more effectively coordinated. Form, build and sustain cooperative relationships within companies to effectively span the alignment challenges presented by organisational silos. Utilise industry-designed, standardised tools to streamline information sharing where appropriate and improve efficiency/effectiveness throughout the TPRM lifecycle. Build critical mass within the TPRM ecosystem using common controls, tools and practices, in order to reduce assessment overhead and improve risk management.
  • 25. 25 Private and Confidential © Copyright 2019www.dvvs.co.uk Keeping Score and Measuring Success Third Party Program Metrics • Quantity of Assessment by Risk Tier • Quantity at current or through stage gates • Open Findings/Remediation Expectations • Assessors Assignments Budgeting • Average cost of an assessment (by tier) • External assessment budget • Travel Costs • Personnel • Training
  • 26. 26 Private and Confidential © Copyright 2019www.dvvs.co.uk How Can I Evaluate SIG? DVV Solutions offer an economical SIG Evaluation Service. A Shared Assessments Certified Third Party Risk Professional provides a detailed look at SIG tooling:- Hands-on walk through of SIG tooling and processes Cross-map your current questionnaire to the SIG-LITE questionnaire set Identify any current risk domain and control gaps Recommend where incorporating SIG could enhance your current processes
  • 27. 27 Private and Confidential © Copyright 2019www.dvvs.co.uk Managed Services What Value Can a Managed Service Provider (MSP) like DVV Solutions Bring to TPRM? • Experience….DVV Solutions has built and run multiple TPRM frameworks for customers • As already discussed….Methodology and standards already in place, therefore time to value is significantly reduced • No need to purchase and manage a TPRM platform, including SIG/SCA • Scalability and flexibility of resources • Accredited Assessors • Free up your own resource to undertake more valuable tasks like reviewing findings and assessing risks
  • 28. 28 Private and Confidential © Copyright 2019www.dvvs.co.uk Questions?
  • 29. 29 Private and Confidential © Copyright 2019www.dvvs.co.uk You’re only as strong as your weakest link