There is nothing like a highly visible data breach to get a chief information security officer (CISO) fired or to dismantle a strong team and reputation. As the year of the data breach spirals on, third-party management has moved to the top of the priority list. Security professionals and executives grapple to ensure that they are applying the right oversight to their suppliers, partners and service providers.

What is really disconcerting is the endless parade of businesses that have been breached and are publicly demonized in the headlines for not protecting client and employee data. Many are not immature startups, but rather those cemented in proven business model foundations, underpinned with time-tested practices and validated by large and trusting consumer bases. These consumer bases include most of us as everyday customers. In fact, if you are not in an affected consumer base, now is a good time to buy a lottery ticket.

Managing Third-Party Security

Effective third-party management is a tall order to fill not because of the impact of a breach and the magnitude of vendors that must be managed, but rather because of the challenge of managing those not directly in the organization. Third-party error is the most impactful factor in the capital cost of a data breach.

Ponemon Institute, “2014 Cost of a Data Breach Study,” February 2014

This number may make all third parties appear as predators and not business partners at all. The magnitude of tracking and managing these external parties is also overwhelming because the average organization has somewhere between 20,000 and 50,000 suppliers, partners and service providers.

This is a huge business management issue, and the CISO is burdened with the responsibility of ensuring these external partners toe the line, step within policy and act like they have the best interests of the business at heart.

Let’s pivot to what an organization must do to regain its footing and move toward excellence in managing third parties. First and foremost, it must be understood that it is going to take more than just being compliant with regulations such as the Payment Card Industry (PCI) or Federal Financial Institutions Examination Council (FFIEC) standards, though adhering to regulations is a good baseline. The PCI Security Council released Version 3 in August. The Office of the Comptroller of the Currency became the first major U.S. banking regulator to issue updated guidance on third-party risk. The FFIEC released new guidance with practical applications this fall.

Best Practices

Security experts agree on the following list of best practices when managing third parties:

  • Ensure you have a comprehensive list of all third parties with which your company does business. Remember the adage “you can’t manage what you can’t see.” This list will cross many business lines and requires a central authority or validation process.
  • Risks should be assigned to each of the third parties. The risks should stem from the firm’s risk registry that is reviewed and ranked annually. A ranking can start with levels such as high, medium and low and be refined later.
  • Establish a governance and escalation procedure. Because suppliers are associated with a cross-section of business lines, there needs to be a central authority that decides how to solve problems. If forensic evidence points to a supplier, there must be a business authority that can decide the appropriate response actions.
  • Actively monitor third parties for compliance to contractually defined policies. The word “contractually” is emphasized here because the contract carries the most weight in any dispute or defense.
  • The monitoring process should be based on a set of rules, which should be structured on the type of service that is provided. Categorizing service types and defining monitoring rules will save time and provide consistency. For example, when outsourcing your information technology (IT) business, you will want to know the vendor’s IT availability statistics and patching status.

Managing third-party risk in today’s complex and dynamic world is a challenge that stumps even the best of companies. A strong third-party risk management program is essential in these times and will provide long-term payoffs. Consistently evaluating the effectiveness of the program through targeted self-testing can help reduce those sleepless nights and mitigate risk.

More from Banking & Finance

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Cost of a data breach 2023: Financial industry impacts

3 min read - According to the IBM Cost of a Data Breach Report 2023, the global average cost of a data breach in 2023 was $4.45 million, 15% more than in 2020. In response, 51% of organizations plan to increase cybersecurity spending this year. For the financial industry, however, global statistics don’t tell the whole story. Finance firms lose approximately $5.9 million per data breach, 28% higher than the global average. In addition, evolving regulatory concerns play a role in how financial companies…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

The rise of malicious Chrome extensions targeting Latin America

9 min read - This post was made possible through the research contributions provided by Amir Gendler and Michael  Gal. In its latest research, IBM Security Lab has observed a noticeable increase in campaigns related to malicious Chrome extensions, targeting  Latin America with a focus on financial institutions, booking sites, and instant messaging. This trend is particularly concerning considering Chrome is one of the most widely used web browsers globally, with a market share of over 80% using the Chromium engine. As such, malicious…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today