There is nothing like a highly visible data breach to get a chief information security officer (CISO) fired or to dismantle a strong team and reputation. As the year of the data breach spirals on, third-party management has moved to the top of the priority list. Security professionals and executives grapple to ensure that they are applying the right oversight to their suppliers, partners and service providers.

What is really disconcerting is the endless parade of businesses that have been breached and are publicly demonized in the headlines for not protecting client and employee data. Many are not immature startups, but rather those cemented in proven business model foundations, underpinned with time-tested practices and validated by large and trusting consumer bases. These consumer bases include most of us as everyday customers. In fact, if you are not in an affected consumer base, now is a good time to buy a lottery ticket.

Managing Third-Party Security

Effective third-party management is a tall order to fill not because of the impact of a breach and the magnitude of vendors that must be managed, but rather because of the challenge of managing those not directly in the organization. Third-party error is the most impactful factor in the capital cost of a data breach.

Ponemon Institute, “2014 Cost of a Data Breach Study,” February 2014

This number may make all third parties appear as predators and not business partners at all. The magnitude of tracking and managing these external parties is also overwhelming because the average organization has somewhere between 20,000 and 50,000 suppliers, partners and service providers.

This is a huge business management issue, and the CISO is burdened with the responsibility of ensuring these external partners toe the line, step within policy and act like they have the best interests of the business at heart.

Let’s pivot to what an organization must do to regain its footing and move toward excellence in managing third parties. First and foremost, it must be understood that it is going to take more than just being compliant with regulations such as the Payment Card Industry (PCI) or Federal Financial Institutions Examination Council (FFIEC) standards, though adhering to regulations is a good baseline. The PCI Security Council released Version 3 in August. The Office of the Comptroller of the Currency became the first major U.S. banking regulator to issue updated guidance on third-party risk. The FFIEC released new guidance with practical applications this fall.

Best Practices

Security experts agree on the following list of best practices when managing third parties:

  • Ensure you have a comprehensive list of all third parties with which your company does business. Remember the adage “you can’t manage what you can’t see.” This list will cross many business lines and requires a central authority or validation process.
  • Risks should be assigned to each of the third parties. The risks should stem from the firm’s risk registry that is reviewed and ranked annually. A ranking can start with levels such as high, medium and low and be refined later.
  • Establish a governance and escalation procedure. Because suppliers are associated with a cross-section of business lines, there needs to be a central authority that decides how to solve problems. If forensic evidence points to a supplier, there must be a business authority that can decide the appropriate response actions.
  • Actively monitor third parties for compliance to contractually defined policies. The word “contractually” is emphasized here because the contract carries the most weight in any dispute or defense.
  • The monitoring process should be based on a set of rules, which should be structured on the type of service that is provided. Categorizing service types and defining monitoring rules will save time and provide consistency. For example, when outsourcing your information technology (IT) business, you will want to know the vendor’s IT availability statistics and patching status.

Managing third-party risk in today’s complex and dynamic world is a challenge that stumps even the best of companies. A strong third-party risk management program is essential in these times and will provide long-term payoffs. Consistently evaluating the effectiveness of the program through targeted self-testing can help reduce those sleepless nights and mitigate risk.

More from Banking & Finance

Exploring DORA: How to manage ICT incidents and minimize cyber threat risks

3 min read - As cybersecurity breaches continue to rise globally, institutions handling sensitive information are particularly vulnerable. In 2024, the average cost of a data breach in the financial sector reached $6.08 million, making it the second hardest hit after healthcare, according to IBM's 2024 Cost of a Data Breach report. This underscores the need for robust IT security regulations in critical sectors.More than just a defensive measure, compliance with security regulations helps organizations reduce risk, strengthen operational resilience and enhance customer trust.…

Unveiling the latest banking trojan threats in LATAM

9 min read - This post was made possible through the research contributions of Amir Gendler.In our most recent research in the Latin American (LATAM) region, we at IBM Security Lab have observed a surge in campaigns linked with malicious Chrome extensions. These campaigns primarily target Latin America, with a particular emphasis on its financial institutions.In this blog post, we’ll shed light on the group responsible for disseminating this campaign. We’ll delve into the method of web injects and Man in the Browser, and…

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today