SlideShare a Scribd company logo
Third Party Risk Assessment Due Diligence:
Managed Service as Best Practice
Sean O’Brien, Director, DVV Solutions
2 Private and Confidential © Copyright 2017
• Experts in Third Party Risk and IT Security
• Shared Assessments member – only UK-based Assessment Firm
• Prevalent EMEA Channel Partner – only EMEA-based Partner
• Certified Third Party Risk Professional accredited Risk Assessors
• Clients across legal, banking, insurance, retail, and public sectors
• SupplierAssess managed service - unique TPRM-as-a-service offering
outsourced risk assessment and analysis
Who We Are
Founded in 1999 | Headquartered in Cheshire, UK
3 Private and Confidential © Copyright 2017
Q. Do you conduct supplier assessments as part of your supplier
onboarding?
Always completed prior to supplier contracts being executed
Completed as least 50% of the time before supplier contracts are executed
Completed less than 50% of the time before supplier contracts are executed
Are often completed (75% or more of the time) after supplier contracts are executed
4 Private and Confidential © Copyright 2017
You’re Only As Strong As Your Weakest Link
• 26,000 website customer accounts exposed
• Third-Party service provider targeted to gain access to
customer payment details
• Attackers had access to the Third-Party’s internal systems
for more than six weeks
eCommerce provider
hacked, 2017
• Around 120,000 customer names and phone numbers,
postal, email and IP addresses exposed
• Hashed account passwords and partial payment card
numbers and expiry dates included
• IT supplier blamed via database backup on AA website
2017 Breach
sparks ICO probe
• Around 400,000 Italian bank accounts accessed in one of
Europe’s largest data breaches
• Unauthorized access through Italian third party provider to
Italian customer data was the cause of the breach
• Breaches occurred in September and October 2016 but
only uncovered in July 2017
2016 Breach
not identified until 2017
• 21,000 Customers compromised in 2014 by “unauthorised
and unlawful access” by staff at call centre in India
• Data gained used in phone scam to build Customer trust to
then release account and financial details
• Fined £100k in August 2017 after £400k fine for hack in 2015
Total of £500,000 fines
from the ICO
5 Private and Confidential © Copyright 2017
2016 Ponemon Study – Third Party Risk Landscape
ONLY 26% of respondents say the process they use to assess
Third Party risk is effective
56% of respondents say they DO NOT KNOW what IP and
other high value “crown jewels” are in the hands of Third
Parties
75% of respondents consider Third Party risk serious and
increasing, while 70% say that Third Party Risk is
SIGNIFICANTLY INCREASING
6 Private and Confidential © Copyright 2017
Third Party Risk Assessment Lifecycle*
• Define Risk Scope
• Define Test Procedures
• Define Data in Use
• Define Risk Tiers
• Review Contract
requirements
• Perform Kick-off
• Obtain Business Unit and
Supplier Documents
• Document Control Test Results
• “Exit” Interview with Supplier
• Analyse Results and Identity “Fails”
• Update Business Unit and Supplier
• Develop Remediation and Timeline
• Remediate Contingent Items (CI)
• Reporting
• Validate Supplier Rating
• Updates based on Change
in Services
• Risk Scoring
Phase 1
Pre-Assessment
Phase 2
Assessment
Phase 3
Post-Assessment
Phase 4
Evaluate the
Assessment
Process
*Copyright, Shared Assessments CTPRP
7 Private and Confidential © Copyright 2017
Pre-Assessment – Which Suppliers Should Be Assessed?
Onboarding – Initial Supplier Assessment
• Based on Risk rating
• Alignment with ongoing assessment requirements
Ongoing – periodic assessments
• Based on Risk rating
• Frequency
• Events/incidents
• Validate Risk rating
8 Private and Confidential © Copyright 2017
Pre-Assessment – What Are We To Assess?
Determine the scope of the assessment
• Risk rating
• Type of services provided
• Type of data
• Location
• Availability
• Periodic or event triggered
Determine appropriate assessment questionnaire(s) to be utilised
9 Private and Confidential © Copyright 2017
Assessment – Supplier Assessment Process
Critical/High Risk supplier assessments must focus on
• Data access and location
• Systems access
• Availability
• Cloud and Application Security
Obtaining supplier information/documentation
• Extremely resource intensive
• Time consuming to compile accurate and complete information
• Manual processes make comprehensive risk reviews and reporting difficult
Unfortunately, lack of time and resources often compromise the scope of assessments
• Assessments aligned with resource availability and time rather than evaluation of IT security and data privacy controls
10 Private and Confidential © Copyright 2017
Supplier Assessment Challenges
 Aligning supplier assessment due diligence with supplier Risk and corporate requirements
 Balancing the need for detailed risk control information with the time and cost of
performing assessments
 Compiling supplier due diligence in a manner it can be efficiently evaluated for additional
risk treatment
 Providing enterprise supplier risk views and effective supplier risk reporting
 Minimise investment in resources while still providing comprehensive supplier
assessments and management reporting
 Only provides a static point-in-time view. Ongoing risk information not obtained or
evaluated
11 Private and Confidential © Copyright 2017
Q. Do you believe you have the resources necessary to initiate and
complete assessments on existing suppliers in a timely manner?
I am not sure what level of resources are required
We have resources to do some (less than 50%) but not all of the required annual assessments
We have resources to complete most (75% or greater) but not all of the required annual assessments
We are able to complete all required annual assessments
12 Private and Confidential © Copyright 2017
Third Party Risk Assessment Lifecycle*
• Define Risk Scope
• Define Test Procedures
• Define Data in Use
• Define Risk Tiers
• Review Contract
requirements
• Perform Kick-off
• Obtain Business Unit and
Supplier Documents
• Document Control Test Results
• “Exit” Interview with Supplier
• Analyse Results and Identity “Fails”
• Update Business Unit and Supplier
• Develop Remediation and Timeline
• Remediate Contingent Items (CI)
• Reporting
• Validate Supplier Rating
• Updates based on Change
in Services
• Risk Scoring
Phase 1
Pre-Assessment
Phase 2
Assessment
Phase 3
Post-Assessment
Phase 4
Evaluate the
Assessment
Process
*Copyright, Shared Assessments CTPRP
Phases Best Suited for Outsourcing
13 Private and Confidential © Copyright 2017
Managed Services for Supplier Assessments
Pre-Assessment
• Assist in the development and implementation of supplier risk ratings based on industry best
practices and corporate requirements
• Assist in the development of supplier questionnaires aligned with vendor risk ratings
• Develop company preferred responses and acceptable mitigation / remediation measures
• Map questionnaires to company and industry requirements
• Obtain information on external threats evaluated in addition to assessment due diligence
• External threat information includes: Breach incidents, Financial reporting, Phishing and Malware
attacks, Legal and Regulatory issues
14 Private and Confidential © Copyright 2017
Managed Services for Supplier Assessments
Assessment
• Assessment evidence is reviewed and analysed. Security controls evaluated based on company requirements
• External threats evaluated in addition to assessment due diligence
• External threat information included in supplier risk scoring and analysis
• Assessment reports, including detailed findings, delivered based on company security and risk ranking criteria
• Assessment reports include risk mitigation / remediation recommendations
• Provide risk based reporting
• Type of service
• Risk classification
• Line of business
15 Private and Confidential © Copyright 2017
Supplier Assessment Process Improvements
Substantial gains in resource capacity from managed services
 Resources traditionally spend 60% of assessment effort initiating assessments and collecting
assessment due diligence
 Additional improvement in resource utilisation from assessment recommendations
 Additional resource capacity translates into the ability to complete substantially more
assessments without increasing headcount
 Capacity receives even greater lift from assessment uniformity and best practices base
recommendations
 Less time needs to be allocated to completing assessment reports
16 Private and Confidential © Copyright 2017
Benefits of Managed Services
 Supplier assessments conducted against specific risk rating and company requirements for controls
 Complete comprehensive supplier assessment and analysis while minimising staffing requirements.
Resources can concentrate on “value added work”
 Reviewing assessment finding and recommendations
 Conducting remediation
 Inclusion of external threats significantly expands the identification of supplier risks that exist outside of
contract based risk control assessment
 Comprehensive vendor risk reporting facilitated by details assessment reports
 Flexible processes and analysis systems provide the ability to smoothly transition to changing demands in
supplier risk management processes, while offering on-demand scalability
17 Private and Confidential © Copyright 2017
Introducing SupplierAssess
Taking the Pain Out of Supplier Risk Management
• Third Party Supplier Assessment Managed Service
• Experienced and qualified team of certified professional assessors
(CTPRP Certified and ISO 27001 Lead Auditors)
• Supplier Risk Manager Service provides automation, workflow, and
a central repository for all assessment information
• Supplier Threat Monitor Service provides real-time Third Party
risk monitoring
• Commitment to providing “information anywhere, security
everywhere” through established processes and service delivery
methodologies
18 Private and Confidential © Copyright 2017
So What Does It Do?
TPRA delivered to your desk
Remote & On Site Assessment
Reporting & Recommendations
Continuous Threat Monitoring
• Ranks suppliers, collects evidence for the review
workflow, and performs risk assessments on each
Third Party supplier
• Ongoing tracking of risk factors between assessments
including Data, Operational, Financial, Brand,
Regulatory events and other Geographical issues
• Supplier Assessment dashboard and detailed
supplier assessment reports that include findings
and mitigation recommendations
19 Private and Confidential © Copyright 2017
How can we help?
xx
Séan O’Brien
DVV Solutions Limited
Grosvenor House, St. Thomas’s Place
Stockport, Cheshire, SK1 3TZ
United Kingdom
www.dvvs.co.uk
Follow us at LinkedIn.com/company/dvv-solutions
Sean M. O’Brien
Director
DDI: +44 (0) 161 476 8702
M: +44 (0) 7973 295 997
E: sobrien@dvvs.co.uk
20 Private and Confidential © Copyright 2017

More Related Content

What's hot

Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
MetroStar
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
Goutama Bachtiar
 
Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...
Kyiv National Economic University
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
Donald Tabone
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
Margarete McGrath
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
CYBER SENSE
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
Bhushan Gurav
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
Prime Infoserv
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
Stephen Cobb
 
Third Party Vendor Risk Managment
Third Party Vendor Risk ManagmentThird Party Vendor Risk Managment
Third Party Vendor Risk Managment
PivotPointSecurity
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
BGA Cyber Security
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
Frederic Girardeau-Montaut
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
Priyanka Aash
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
Farook Al-Jibouri
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
AlienVault
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
JoniGarcia9
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 

What's hot (20)

Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018Information Security Management System with ISO/IEC 27000:2018
Information Security Management System with ISO/IEC 27000:2018
 
Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...Definitive guide to third-party risk management - how to successfully mitigat...
Definitive guide to third-party risk management - how to successfully mitigat...
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
IT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSALIT SECURITY ASSESSMENT PROPOSAL
IT SECURITY ASSESSMENT PROPOSAL
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Third Party Vendor Risk Managment
Third Party Vendor Risk ManagmentThird Party Vendor Risk Managment
Third Party Vendor Risk Managment
 
Microsoft Azure Sentinel
Microsoft Azure SentinelMicrosoft Azure Sentinel
Microsoft Azure Sentinel
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
SOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOCSOC Architecture - Building the NextGen SOC
SOC Architecture - Building the NextGen SOC
 
Cyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
 
Vulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize RiskVulnerability Management: What You Need to Know to Prioritize Risk
Vulnerability Management: What You Need to Know to Prioritize Risk
 
security-reference-architecture.pdf
security-reference-architecture.pdfsecurity-reference-architecture.pdf
security-reference-architecture.pdf
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 

Similar to Third Party Risk Assessment Due Diligence - Managed Service as Best Practice

Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider Governance
Alan McSweeney
 
Services Procurement - SOWs Best Practices
Services Procurement - SOWs Best PracticesServices Procurement - SOWs Best Practices
Services Procurement - SOWs Best Practices
PeopleFluent
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
Raminder Pal Singh
 
Managing-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-AdvantageManaging-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-Advantage
ddodd
 
Compliance Basics Presentation
Compliance Basics PresentationCompliance Basics Presentation
Compliance Basics Presentation
Compliagent
 
Cybersecurity Program Assessment Services
Cybersecurity Program Assessment ServicesCybersecurity Program Assessment Services
Cybersecurity Program Assessment Services
Michael Corcoran, CPA
 
Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)
Vishnuvarthanan Moorthy
 
Asa Presentation
Asa PresentationAsa Presentation
Asa Presentation
Kim Mepham
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
Sam Bowne
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Nidhi Gupta
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Rahul Bhan (CA, CIA, MBA)
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Rahul Bhan (CA, CIA, MBA)
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
Nidhi Gupta
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
Jim Kaplan CIA CFE
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilities
Saumya S
 
Outsourcing: Issues & Technicalities
Outsourcing: Issues & TechnicalitiesOutsourcing: Issues & Technicalities
Outsourcing: Issues & Technicalities
Elijah Ezendu
 
Best Practices For Identifying Offshore Vendors
Best Practices For Identifying Offshore VendorsBest Practices For Identifying Offshore Vendors
Best Practices For Identifying Offshore Vendors
D2E CONSULTING
 
Outsource.ppt
Outsource.pptOutsource.ppt
Outsource.ppt
Sampath Sredharran
 
Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
EDR
 
IBM Smarter Asset Management Procurement
IBM Smarter Asset Management ProcurementIBM Smarter Asset Management Procurement
IBM Smarter Asset Management Procurement
Domenico Merlino
 

Similar to Third Party Risk Assessment Due Diligence - Managed Service as Best Practice (20)

Supplier And Service Provider Governance
Supplier And Service Provider GovernanceSupplier And Service Provider Governance
Supplier And Service Provider Governance
 
Services Procurement - SOWs Best Practices
Services Procurement - SOWs Best PracticesServices Procurement - SOWs Best Practices
Services Procurement - SOWs Best Practices
 
Outsourcing and Vendor management
Outsourcing and Vendor managementOutsourcing and Vendor management
Outsourcing and Vendor management
 
Managing-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-AdvantageManaging-Supplier-Performance-Key-Competitive-Advantage
Managing-Supplier-Performance-Key-Competitive-Advantage
 
Compliance Basics Presentation
Compliance Basics PresentationCompliance Basics Presentation
Compliance Basics Presentation
 
Cybersecurity Program Assessment Services
Cybersecurity Program Assessment ServicesCybersecurity Program Assessment Services
Cybersecurity Program Assessment Services
 
Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)Scalable integrated program audit (sipa)
Scalable integrated program audit (sipa)
 
Asa Presentation
Asa PresentationAsa Presentation
Asa Presentation
 
CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)CNIT 160 4b: Security Program Management (Part 2)
CNIT 160 4b: Security Program Management (Part 2)
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
Vendor risk management 2013
Vendor risk management 2013Vendor risk management 2013
Vendor risk management 2013
 
It62015 slides
It62015 slidesIt62015 slides
It62015 slides
 
Cloudway sipm capabilities
Cloudway sipm capabilitiesCloudway sipm capabilities
Cloudway sipm capabilities
 
Outsourcing: Issues & Technicalities
Outsourcing: Issues & TechnicalitiesOutsourcing: Issues & Technicalities
Outsourcing: Issues & Technicalities
 
Best Practices For Identifying Offshore Vendors
Best Practices For Identifying Offshore VendorsBest Practices For Identifying Offshore Vendors
Best Practices For Identifying Offshore Vendors
 
Outsource.ppt
Outsource.pptOutsource.ppt
Outsource.ppt
 
Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?Vendor Management Best Practices: Is Your Program Up to Par?
Vendor Management Best Practices: Is Your Program Up to Par?
 
IBM Smarter Asset Management Procurement
IBM Smarter Asset Management ProcurementIBM Smarter Asset Management Procurement
IBM Smarter Asset Management Procurement
 

More from DVV Solutions Third Party Risk Management

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
DVV Solutions Third Party Risk Management
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
DVV Solutions Third Party Risk Management
 
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
DVV Solutions Third Party Risk Management
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Third Party Risk Management
 
Third Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINALThird Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINAL
DVV Solutions Third Party Risk Management
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
DVV Solutions Third Party Risk Management
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
DVV Solutions Third Party Risk Management
 
DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Third Party Risk Management
 
DVV Solutions About Us Datasheet
DVV Solutions About Us DatasheetDVV Solutions About Us Datasheet
DVV Solutions About Us Datasheet
DVV Solutions Third Party Risk Management
 

More from DVV Solutions Third Party Risk Management (9)

Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19
 
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
 
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
 
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
DVV Solutions Central Bank of Ireland Outsourcing discussion paper response 1...
 
Third Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINALThird Party Network Webinar Slide Deck 110718 FINAL
Third Party Network Webinar Slide Deck 110718 FINAL
 
Data Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service OverviewData Protection & GDPR Health Check Service Overview
Data Protection & GDPR Health Check Service Overview
 
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103A Comprehensive Approach To Third Party Risk Management White Paper 20180103
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
 
DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016DVV Solutions Legal Vendor Network White Paper April 2016
DVV Solutions Legal Vendor Network White Paper April 2016
 
DVV Solutions About Us Datasheet
DVV Solutions About Us DatasheetDVV Solutions About Us Datasheet
DVV Solutions About Us Datasheet
 

Recently uploaded

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Third Party Risk Assessment Due Diligence - Managed Service as Best Practice

  • 1. Third Party Risk Assessment Due Diligence: Managed Service as Best Practice Sean O’Brien, Director, DVV Solutions
  • 2. 2 Private and Confidential © Copyright 2017 • Experts in Third Party Risk and IT Security • Shared Assessments member – only UK-based Assessment Firm • Prevalent EMEA Channel Partner – only EMEA-based Partner • Certified Third Party Risk Professional accredited Risk Assessors • Clients across legal, banking, insurance, retail, and public sectors • SupplierAssess managed service - unique TPRM-as-a-service offering outsourced risk assessment and analysis Who We Are Founded in 1999 | Headquartered in Cheshire, UK
  • 3. 3 Private and Confidential © Copyright 2017 Q. Do you conduct supplier assessments as part of your supplier onboarding? Always completed prior to supplier contracts being executed Completed as least 50% of the time before supplier contracts are executed Completed less than 50% of the time before supplier contracts are executed Are often completed (75% or more of the time) after supplier contracts are executed
  • 4. 4 Private and Confidential © Copyright 2017 You’re Only As Strong As Your Weakest Link • 26,000 website customer accounts exposed • Third-Party service provider targeted to gain access to customer payment details • Attackers had access to the Third-Party’s internal systems for more than six weeks eCommerce provider hacked, 2017 • Around 120,000 customer names and phone numbers, postal, email and IP addresses exposed • Hashed account passwords and partial payment card numbers and expiry dates included • IT supplier blamed via database backup on AA website 2017 Breach sparks ICO probe • Around 400,000 Italian bank accounts accessed in one of Europe’s largest data breaches • Unauthorized access through Italian third party provider to Italian customer data was the cause of the breach • Breaches occurred in September and October 2016 but only uncovered in July 2017 2016 Breach not identified until 2017 • 21,000 Customers compromised in 2014 by “unauthorised and unlawful access” by staff at call centre in India • Data gained used in phone scam to build Customer trust to then release account and financial details • Fined £100k in August 2017 after £400k fine for hack in 2015 Total of £500,000 fines from the ICO
  • 5. 5 Private and Confidential © Copyright 2017 2016 Ponemon Study – Third Party Risk Landscape ONLY 26% of respondents say the process they use to assess Third Party risk is effective 56% of respondents say they DO NOT KNOW what IP and other high value “crown jewels” are in the hands of Third Parties 75% of respondents consider Third Party risk serious and increasing, while 70% say that Third Party Risk is SIGNIFICANTLY INCREASING
  • 6. 6 Private and Confidential © Copyright 2017 Third Party Risk Assessment Lifecycle* • Define Risk Scope • Define Test Procedures • Define Data in Use • Define Risk Tiers • Review Contract requirements • Perform Kick-off • Obtain Business Unit and Supplier Documents • Document Control Test Results • “Exit” Interview with Supplier • Analyse Results and Identity “Fails” • Update Business Unit and Supplier • Develop Remediation and Timeline • Remediate Contingent Items (CI) • Reporting • Validate Supplier Rating • Updates based on Change in Services • Risk Scoring Phase 1 Pre-Assessment Phase 2 Assessment Phase 3 Post-Assessment Phase 4 Evaluate the Assessment Process *Copyright, Shared Assessments CTPRP
  • 7. 7 Private and Confidential © Copyright 2017 Pre-Assessment – Which Suppliers Should Be Assessed? Onboarding – Initial Supplier Assessment • Based on Risk rating • Alignment with ongoing assessment requirements Ongoing – periodic assessments • Based on Risk rating • Frequency • Events/incidents • Validate Risk rating
  • 8. 8 Private and Confidential © Copyright 2017 Pre-Assessment – What Are We To Assess? Determine the scope of the assessment • Risk rating • Type of services provided • Type of data • Location • Availability • Periodic or event triggered Determine appropriate assessment questionnaire(s) to be utilised
  • 9. 9 Private and Confidential © Copyright 2017 Assessment – Supplier Assessment Process Critical/High Risk supplier assessments must focus on • Data access and location • Systems access • Availability • Cloud and Application Security Obtaining supplier information/documentation • Extremely resource intensive • Time consuming to compile accurate and complete information • Manual processes make comprehensive risk reviews and reporting difficult Unfortunately, lack of time and resources often compromise the scope of assessments • Assessments aligned with resource availability and time rather than evaluation of IT security and data privacy controls
  • 10. 10 Private and Confidential © Copyright 2017 Supplier Assessment Challenges  Aligning supplier assessment due diligence with supplier Risk and corporate requirements  Balancing the need for detailed risk control information with the time and cost of performing assessments  Compiling supplier due diligence in a manner it can be efficiently evaluated for additional risk treatment  Providing enterprise supplier risk views and effective supplier risk reporting  Minimise investment in resources while still providing comprehensive supplier assessments and management reporting  Only provides a static point-in-time view. Ongoing risk information not obtained or evaluated
  • 11. 11 Private and Confidential © Copyright 2017 Q. Do you believe you have the resources necessary to initiate and complete assessments on existing suppliers in a timely manner? I am not sure what level of resources are required We have resources to do some (less than 50%) but not all of the required annual assessments We have resources to complete most (75% or greater) but not all of the required annual assessments We are able to complete all required annual assessments
  • 12. 12 Private and Confidential © Copyright 2017 Third Party Risk Assessment Lifecycle* • Define Risk Scope • Define Test Procedures • Define Data in Use • Define Risk Tiers • Review Contract requirements • Perform Kick-off • Obtain Business Unit and Supplier Documents • Document Control Test Results • “Exit” Interview with Supplier • Analyse Results and Identity “Fails” • Update Business Unit and Supplier • Develop Remediation and Timeline • Remediate Contingent Items (CI) • Reporting • Validate Supplier Rating • Updates based on Change in Services • Risk Scoring Phase 1 Pre-Assessment Phase 2 Assessment Phase 3 Post-Assessment Phase 4 Evaluate the Assessment Process *Copyright, Shared Assessments CTPRP Phases Best Suited for Outsourcing
  • 13. 13 Private and Confidential © Copyright 2017 Managed Services for Supplier Assessments Pre-Assessment • Assist in the development and implementation of supplier risk ratings based on industry best practices and corporate requirements • Assist in the development of supplier questionnaires aligned with vendor risk ratings • Develop company preferred responses and acceptable mitigation / remediation measures • Map questionnaires to company and industry requirements • Obtain information on external threats evaluated in addition to assessment due diligence • External threat information includes: Breach incidents, Financial reporting, Phishing and Malware attacks, Legal and Regulatory issues
  • 14. 14 Private and Confidential © Copyright 2017 Managed Services for Supplier Assessments Assessment • Assessment evidence is reviewed and analysed. Security controls evaluated based on company requirements • External threats evaluated in addition to assessment due diligence • External threat information included in supplier risk scoring and analysis • Assessment reports, including detailed findings, delivered based on company security and risk ranking criteria • Assessment reports include risk mitigation / remediation recommendations • Provide risk based reporting • Type of service • Risk classification • Line of business
  • 15. 15 Private and Confidential © Copyright 2017 Supplier Assessment Process Improvements Substantial gains in resource capacity from managed services  Resources traditionally spend 60% of assessment effort initiating assessments and collecting assessment due diligence  Additional improvement in resource utilisation from assessment recommendations  Additional resource capacity translates into the ability to complete substantially more assessments without increasing headcount  Capacity receives even greater lift from assessment uniformity and best practices base recommendations  Less time needs to be allocated to completing assessment reports
  • 16. 16 Private and Confidential © Copyright 2017 Benefits of Managed Services  Supplier assessments conducted against specific risk rating and company requirements for controls  Complete comprehensive supplier assessment and analysis while minimising staffing requirements. Resources can concentrate on “value added work”  Reviewing assessment finding and recommendations  Conducting remediation  Inclusion of external threats significantly expands the identification of supplier risks that exist outside of contract based risk control assessment  Comprehensive vendor risk reporting facilitated by details assessment reports  Flexible processes and analysis systems provide the ability to smoothly transition to changing demands in supplier risk management processes, while offering on-demand scalability
  • 17. 17 Private and Confidential © Copyright 2017 Introducing SupplierAssess Taking the Pain Out of Supplier Risk Management • Third Party Supplier Assessment Managed Service • Experienced and qualified team of certified professional assessors (CTPRP Certified and ISO 27001 Lead Auditors) • Supplier Risk Manager Service provides automation, workflow, and a central repository for all assessment information • Supplier Threat Monitor Service provides real-time Third Party risk monitoring • Commitment to providing “information anywhere, security everywhere” through established processes and service delivery methodologies
  • 18. 18 Private and Confidential © Copyright 2017 So What Does It Do? TPRA delivered to your desk Remote & On Site Assessment Reporting & Recommendations Continuous Threat Monitoring • Ranks suppliers, collects evidence for the review workflow, and performs risk assessments on each Third Party supplier • Ongoing tracking of risk factors between assessments including Data, Operational, Financial, Brand, Regulatory events and other Geographical issues • Supplier Assessment dashboard and detailed supplier assessment reports that include findings and mitigation recommendations
  • 19. 19 Private and Confidential © Copyright 2017 How can we help? xx Séan O’Brien DVV Solutions Limited Grosvenor House, St. Thomas’s Place Stockport, Cheshire, SK1 3TZ United Kingdom www.dvvs.co.uk Follow us at LinkedIn.com/company/dvv-solutions Sean M. O’Brien Director DDI: +44 (0) 161 476 8702 M: +44 (0) 7973 295 997 E: sobrien@dvvs.co.uk
  • 20. 20 Private and Confidential © Copyright 2017