Managing Third Party Risk ISACA
Managing Third Party Risk ISACA
MANAGING
T H I R D - PA RT Y
RISK
Cyberrisk Practices for Better Enterprise Risk
Management
2 MANAGING THIRD-PARTY RISK
CONTENTS
4 Introduction
5 Key Definitions for Third-party Risk
5 Third-party Governance
5 / Third-party Management Roles
6 / Enterprise Procurement
6 / Third-party Data Handling Agreement
6 / Third-party Metadata
7 Third-party Risk Assessment Process
7 / Third-party Risk Triage (Inherent Risk
Assessment)
8 / Third-party Data Classification
9 / Third-party Administrative
Assessment
9 / Contract
9 / Penetration Testing (Pentest)
Results
9 / Accreditation, Certifications and
Other External Audit Reports
10 / Internal Audit Reports
10 / Policy Review
10 / Data Flows
11 / Open Issues (From Previous
Assessments)
11 / Incidents
11 / Control Questionnaire
11 / Third-party Onsite Assessments
12 / Technology-aided Reviews
13 Risk Analysis
14 Threat Modeling
15 Determining Risk Ratings
16 Assessment Closeout and Ongoing Monitoring
17 Conclusion
18 Acknowledgments
ABSTRACT
Many enterprises rely on third-party vendors to help facilitate the delivery of products and
services to their customers. However, these relationships come with risk. Data privacy
must be a top priority in these relationships. Ultimately, the enterprise is accountable for
the protection of its data; therefore, enterprise vendor risk management must ensure a
safe and healthy relationship with suppliers. Enterprises must also have sound
governance, which includes business and technical requirements to ensure due diligence
in the protection of the enterprise and its customers’ data. A robust third-party risk
management program includes the integration of risk management processes into
enterprise and IT business practices. This white paper provides you with best practices to
help manage enterprise third-party risk.
Introduction
End-of-year holiday shopping is critical for retail party risk; it left many wondering which third parties on
businesses. As a result, there is a lot of emphasis on their networks could cause a similar breach. The link
ensuring that business operations are working flawlessly, between the retailer and its HVAC third party allowed
including an enterprises’ credit card processing systems. clever adversaries to infiltrate the retailer’s network, infect
During this critical time of year in 2013, a landmark third- the retailer’s systems and extract millions of records. The
party cyberrisk incident occurred at a large US-based breach not only raises questions about how much an
retailer. A phishing campaign infected the retailer’s enterprise really knows about its third parties, the controls
heating, ventilation and air conditioning (HVAC) contractor that they have in place, the effectiveness of the controls
with the Citadel trojan, which enabled attackers to gain full and the nature of risk acceptance in third-party
control over the contractor’s systems. After a few lateral contracts—it also creates fear about what can go wrong.
moves and pivoting techniques, the hackers discovered
that this HVAC contractor had access to the retailer’s The breach established a dominant narrative for many
business executives considering their enterprises’ third-
billing and project management systems.1 1
1
1
Krebs, B.; “Target Hackers Broke in Via HVAC Company,” KrebsonSecurity, 5 February 2014, https://krebsonsecurity.com/2014/02/target-hackers-broke-
in-via-hvac-company/
2
2
Krebs, B.; “A First Look at the Target Intrusion, Malware,” KrebsonSecurity, 15 January 2014; https://krebsonsecurity.com/2014/01/a-first-look-at-the-
target-intrusion-malware/
3
3
Consumer Bankers Association (CBA), “Cost of Target Data Breach Exceeds $200 Million,” 18 February 2014, https://www.consumerbankers.com/cba-
media-center/media-releases/cost-target-data-breach-exceeds-200-million
Some enterprises—including government-sponsored This white paper uses terminology from the Open FAIR™
enterprises (GSEs)—provide obligatory access to certain standard4 to ensure clear communication of terms and
4
governmental or quasi-governmental organizations. For consistent use of concepts in enterprise risk calculation.5 5
Third-party Governance
The importance of having a complete list of all third needs, and the general level of access necessary to
parties of an enterprise cannot be overstated. There is no execute the job. The business owner role commands the
worse scenario than receiving notification from an leverage with the third party to compel it to take security
unknown third party that they experienced a breach seriously. This leverage often results in compelling
affecting the enterprise. The Center for Internet Security ® remediation activities and responses to any control
(CIS ) top 20 critical security controls (CSCs)—also known
® deficiencies that might be uncovered. A business owner
6
as CIS Controls or the SANS top 20 —cite inventory of
™ ™ 6
tends to own the contract and often signs it, and initiates
approved hardware and software as the first two security contract modifications that are necessary to support
controls. No third party is reducible to hardware or increased security posture.
software—but inventory management for enterprise third
For large enterprises that may have several contracts with
parties is covered in these critical controls. To ensure
a single third party, the relationship manager role often
accuracy of third-party lists, the key control is clearly
has overall accountability for the entirety of the third-party
defining enterprise roles responsible for each aspect of
relationship. This role is similar to the business owner, but
the third-party engagement life cycle.
requires greater understanding of the overall third-party
scope of work. The relationship manager must have
Third-party Management Roles sufficient expertise and authority commensurate with the
Typically, a third party provides services or products for risk and complexity of goods and services offered by the
one person, who is often referred to as the business third party. The relationship manager’s primary vehicle for
owner in the enterprise. This role defines duties or control is the master services agreement (MSA). This
deliverables from the third party, and often pays the third- legal agreement documents the terms and conditions
party fees. This very critical role requires deep under which the enterprise and the third party interact and
understanding of the third party’s function and/or actions details overall control paradigms that are uniform across
on behalf of the enterprise, the data that the third party all subordinate contracts. The MSA often mandates
4
4
The Open Group®, Open FAIR™ (Factor Analysis of Information Risk), https://publications.opengroup.org/editors-picks/open-fair
5
5
The Open Group, Risk Taxonomy (O-RT) Version 2.0, 18 October 2013, https://publications.opengroup.org/c13k
6
6
Center for Internet Security, “CIS Controls™,” https://www.cisecurity.org/controls/; Sans™ Institute, “The CIS Critical Security Controls for Effective Cyber
Defense,” https://www.sans.org/critical-security-controls/
the data types and volumes that third parties store, • Type of data elements that each third party accesses, including:
process and transmit helps an enterprise understand the • Tax identification numbers
role of the third party. Tracking the country in which data • Genetic information
are manipulated helps ensure compliance with data • Health billing codes
privacy laws and other legal and contractual obligations, • Countries where a third party processes data or moves data
and also helps the enterprise maintain current data-flow • Platforms for processing data, i.e., local computing resources or
documentation—all essential information for assessing a cloud server (including, as applicable, the specific cloud)
enterprise risk. The ability to query specific data elements that third
parties access is critical to the third-party risk triage
Ideally, metadata should be correlated with records of
process.
authorized third parties and stored in a central database
that supports ad hoc queries. An enterprise could query
the database for information, such as:
safeguard the third party from undue harm, such as targeted • Those who would live, regardless of what doctors did
attacks by insiders. This veil is similar to the one that an • Those who would die, regardless of what doctors did
enterprise applies to its responses to security-program inquiries • Those who might live if they received immediate attention
from customers; an enterprise provides high-level information A third-party risk triage process does not need to be quite
about its security program, but rarely reveals specific so intense, but the same basic rules can apply. If an
information. enterprise has limited resources to conduct third-party
• Most enterprises have many third parties that may not require a reviews, it can prioritize third parties based on risk, and
security assessment. For example, office supply companies are ration resources to those third parties that should get the
not likely to pose an information security risk to an enterprise. A most attention to help stave off grave risk. The triage
risk triage process is required to determine the appropriate level process—also called a third-party inherent risk
of engagement for each third party. assessment—groups third parties into three categories
according to potential risk:
1 Third parties that receive no reviews (no further assessments) 6 Will this third party have the ability to move money, make
2 Third parties that receive an administrative review, such as a investments or otherwise commit money to be spent on behalf
questionnaire and/or a scan of the enterprise?
3 Third parties that receive a significant review, such as an 7 What is the business criticality of the systems in use or affected
administrative review plus an onsite evaluation by this third party?
To determine the inherent risk that a third party can pose, 8 If the systems/services provided by the third party go offline, is
the enterprise evaluates third-party demographic data and the enterprise required to notify regulators or pay fines to its
This evaluation necessitates understanding: 9 Is the enterprise required to produce and/or submit evidence of
• Volume and nature of data shared with the third party (which
enterprise may want to ask. An enterprise should develop
3 Will the use of this third party introduce any net new
Third-party Data Classification
technologies to the enterprise? Many of the questions in the previous section cover the
4 Will this third party introduce any new functions for an existing confidentiality, integrity and availability (CIA) triad7 In order 7
7
Regarding confidentiality, integrity and availability security triad, see Sundaram, J.; "The Benefits of the Statement of Applicability in ISMS Projects,"
ISACA Journal, 2017:3, https://www.isaca.org/Journal/archives/2017/Volume-3/Pages/the-benefits-of-the-statement-of-applicability-in-isms-projects.aspx.
classification directly—e.g., confidential or personally obligated to perform on behalf of the enterprise. Contracts
identifiable information (PII). Instead, the respondent will can include the MSA and/or any other special project
indicate the specific data elements that are in use; the agreements that are in place, including, for example,
questionnaire applies logic and derives the classification statements of work (SOWs). The enterprise should verify
for them. For example, respondents select Social Security that there is a right to audit clause; if no such clause
number, driver license number, health diagnostic codes or exists, the enterprise may be very limited as to what it can
mental health records. These data types can be correlated do in the assessment.
with the appropriate category and classification labels
(e.g., PII and confidential). This approach gives the Penetration Testing (Pentest) Results
enterprise the added benefit of an inventory of the data
The enterprise should ask the third party for detailed
types in use by the enterprise and indicates to which third
pentest results (although the enterprise may not be able
parties the data are being transmitted. This information is
to get them, or may receive only redacted or summary
critical for compliance with certain privacy regulations
versions). If the enterprise does not receive pentest
and some customer contracts (for example, a contract
results, this fact is included in the issue management
may state that certain data types cannot be sent
process. Pentest results are assurance, from either a third
offshore). This inventory is also helpful if the third party
party conducting the pentest or the unbiased output of a
incurs a data breach. One of the first questions that an
software tool, that the systems are as secure as
enterprise may want to ask is, “What data do we have
warranted. For any significant adverse findings from these
there?” Not having the answer to this question puts an
results, the enterprise asks for assurance from the third
enterprise at greater risk if a breach occurs.
party that the findings were resolved. Some third parties
may share pentest reports, but only for external systems—
Third-party Administrative e.g., those with external Internet Protocol (IP) addresses.
Finally, it is important to know against which risk
Assessment
scenarios these kinds of controls protect (that is, against
For third parties that fall into the first triage category—i.e.,
external attackers versus insiders).
no further review—the only assessment requirement is to
monitor the third parties to see if anything changes. An
Accreditation, Certifications and Other
annual review of these third parties is recommended;
business owners are responsible for accurate answers to
External Audit Reports
the risk questions and should inform the enterprise if This assessment category includes a statement provided
anything changes that brings the third parties into scope by an external auditor attesting to the third-party’s state of
for further action. security upon which the enterprise can rely—for example,
an ISO 27001 registration, which can be verified on the
For the second category—i.e., administrative
issuing organization’s website. It may also include:
assessment—a range of steps will help the enterprise gain
• Statement on Standards for Attestation Engagements (SSAE)
comfort without sending staff to third-party offices for a
No. 16 reports
review. The following subsections cover documentation
• Service Organization Control (SOC) type 1 or 2 reports
that can be reviewed, along with key considerations for
• Payment Card Industry Data Security Standard (PCI DSS)
each category.
testing results
8
8
US National Institute of Standards and Technology, NIST Special Publication 800-53 Revision 4, April 2013,
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
9
9
NIST, Framework for Improving Critical Infrastructure Cybersecurity, 16 April 2018, https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.04162018.pdf
10
10
Op cit SANS™ Institute
11
11
US Department of Health and Human Services, Health Insurance Portability and Accountability Act, https://www.hhs.gov/hipaa/for-
professionals/privacy/laws-regulations/combined-regulation-text/index.html
12
12
US Department of Homeland Security, Federal Information Security Modernization Act, https://www.dhs.gov/cisa/federal-information-security-
modernization-act
13
13
North American Electric Reliability Corporation, https://www.nerc.com/pa/Stand/Pages/default.aspx
14
14
ISACA, COBIT® 2019, USA, 2018, http://www.isaca.org/COBIT/Pages/default.aspx
Open Issues (From Previous Assessments) party has done what any reasonable enterprise would do
to ensure its data are protected. Third parties in this
If the enterprise has assessed the third party before, it
category undergo an administrative assessment and an
reviews the work papers from the previous engagement,
onsite assessment.
looking for follow-up activity and closure of findings in the
interim. Lack of action can indicate lack of commitment to An interviewing style should be cultivated to help third
secure the third party’s environment. The enterprise asks parties assessors understand some nonverbal responses
its business owners to sign off on any risk associated that may be given to inquiries, how to interpret them and
with third-party control deficiencies from this and any which questions can aid in gathering information.19 The 19
providers) try to prohibit the assessor from visiting the • Upload documents
data center entirely. In the former case, assessors should • Complete questionnaires
insist on visiting other locations, or even rotate site visits • Score third-party responses
over time, looking at the data center one time, and the call • Notify the enterprise of next steps (such as manual review of
center another time, etc. In the latter case, if an onsite visit uploaded files)
to the data center is prohibited outright, the assessor • Schedule an onsite review
must decide whether to recommend dropping the third Some vendors provide staff to conduct onsite reviews for
party to business owners, or continue the relationship the enterprise, to augment the capabilities of enterprise
with a qualified statement in a risk acceptance that the staff. Other vendors offer a repository of completed third-
enterprise is unable to conduct onsite validation. Such party assessments.
cloud providers typically point to the sheer number of
For providers with many customers, responding to a
clients they have and indicate that they simply cannot
bespoke assessment from each can be prohibitively time-
accommodate that number of onsite visits. Typically, they
consuming. Instead, some third parties opt into a
also provide some alternative documentation to show that
voluntary association where they complete one
they have third-party verification of their controls, so
assessment and make the results available to all
further assessment is unnecessary.
organizations that need them. The Cloud Security
Many third parties try to limit an assessor’s time to just Alliance® (CSA) offers a version of this service for cloud
the data center; others (as is often the case with cloud service providers, called the Security, Trust and Assurance
providers) try to prohibit the assessor from visiting the
data center entirely. Registry (or STAR Registry).20 The Santa Fe Group also
20
to various third-party locations, they take advantage of information sharing repositories, such as the
technology, conduct their interviews over videoconference Vendorpedia™ Third-Party Risk Exchange, which houses a
equipment and request virtual walkthroughs via video. collection of independently gathered information about a
Some enterprises hire national firms to conduct their company and contributed items.22 It can also include the
22
onsite reviews for them, or leverage other enterprise staff results of onsite assessments to significantly expedite an
in the area to avoid travel charges and limit the impact on assessment process.
assessment personnel.
Lastly, there are several online repositories of incidents
that an enterprise can search to determine whether any
Technology-aided Reviews relevant events affect a given third party (many third-party
Software vendors can assist with the third-party risk software services include these as well). One such free,
assessment processes in several ways. Many nonprofit service is the Privacy Rights Clearinghouse,
applications facilitate assessments by increasing which makes thousands of public data-breach records
automation. For example, if an enterprise solicits available for searching.23 There are also paid services,
23
documents from third parties, or gathers responses to a such as Risk-Based Security Cyber Risk Analytics
questionnaire, a software-as-a-service (SaaS) vendor may (formerly the free Datalossdb service)24 and OneTrust’s
24
20
20
Cloud Security Alliance, “CSA Security Trust Assurance and Risk (STAR),” https://cloudsecurityalliance.org/star/
21
21
Op cit Santa Fe Group
22
22
Vendorpedia, “The World’s Only Security and Privacy Third-Party Risk Exchange,” OneTrust, www.vendorpedia.org/
23
23
Privacy Rights Clearinghouse, “Empowering Consumers. Protecting Privacy.,” www.privacyrights.org/
24
24
Cyber Risk Analytics, “Actionable Vendor Risk Management,” www.cyberriskanalytics.com/
25
25
OneTrust, “OneTrust Acquires DataGuidance, Integrates Hundreds of Privacy Laws into OneTrust Privacy Management Technology,” 11 March 2019,
www.onetrust.com/company/news/press-releases/onetrust-acquires-dataguidance/
Software can also assist in the control-assessment space. Various assumptions underlie these approaches and
In addition to conducting surveys about third-party control should be called out. While automation can evaluate a
posture, various firms enable enterprises to view the large number of third parties expediently, the scope of
results of an automated control evaluation, typically done resulting assessments can be very limited, and may not
via scanning tools. These tools gather whatever reflect the use case(s) for which the enterprise employs
information they can about a third party from sites on the the third party. For example, if an enterprise allows its SSL
dark web, and perform the equivalent of an certificate to expire on an external system—but that
unauthenticated scan against the third party’s public- system is not used in the business process and data
facing systems. The tools look for botnet activity coming flows in the contracted work—it might have limited
from Internet Protocol (IP) addresses associated with the applicability to the enterprise evaluation of that third-party
third party. The tools can evaluate the status of secure risk posture. It may be indicative of an overall lax
sockets layer (SSL) certificates. Results are holistically approach to security, or it may be the result of a risk-
scored on an ordinal scale, and a security rating is based approach to certificate management. The
extrapolated from the score (in some cases, a security usefulness of this can vary, so it is important to include a
maturity rating may also be assigned). level of analyst discretion in the enterprise assessment
model.
Risk Analysis
After all third-party evaluations are complete, the risk enterprise about its risk posture. This is where the notion
analyst puts the results into a risk calculation function. of a fully qualified risk statement becomes important.
Processes based on standards such as ISO or NIST Fashioned after a fully qualified domain name, this is a
recommend that enterprises consider assets at risk, complete statement of harm that allows the enterprise, at
threats to those assets and all associated controls; a glance, to see who is failing, what is failing and the
enterprises should then synthesize the data points to impact. Two examples of such risk statements follow:
produce a holistic risk rating for that third party. This is a • Privileged insiders at a third party use legitimately granted
high-level version of a risk assessment process that is credentials to access customer records and compromise their
applicable to any IT asset inclusive of third parties. confidentiality.
Because these risk assessment standards tend to be • Cybercriminals leverage software vulnerabilities in externally
silent on the specifics of how to arrive at a risk rating, it is facing systems of a third party, resulting in a service outage of a
important to discuss briefly some ways to improve the critical business process.
rigor and reliability of the enterprise third-party risk rating
These statements provide critical information at a glance.
process (or risk analysis process).
First, it is known who is doing or initiating the actions. This
Processes based on standards such as ISO or NIST is not meant to be a clear statement of attribution; indeed,
recommend that enterprises consider assets at risk, attribution is very hard and not typically necessary for risk
threats to those assets and all associated controls;
analysis. Instead, it helps an enterprise to be very clear
enterprises should then synthesize the data points to
produce a holistic risk rating for that third party. about which threat actor communities are in play. This
gives the enterprise a key piece of data around building
The first critical component of conducting a risk analysis the first important risk analysis variable: frequency of loss.
is to become clear about what is at risk, and what the
results of the third-party assessment actually tell the
With this, the enterprise can estimate how often these failures, endpoint security hygiene or business continuity
threat communities are making a move on a critical asset. failures. If more precision is required, the enterprise can
also analyze them at more granular levels (this requires a
The next data point critical to understanding the overall
larger number of risk statements to cover all the relevant
risk posture is where the failure occurred. This section in
scenarios).
particular is informed by the results of the third-party
assessment thus far. The results provide insight into third- The last part of the risk statement allows the enterprise to
party control deficiencies. Perhaps during the onsite understand fully what the impact to the organization will
walkthrough the enterprise assessors noticed that the be. For example, in the first statement, there is a loss of
data center had a false ceiling, so they can see that the confidentiality (data breach), and, in the second, there is a
physical security controls protecting enterprise data at the loss of availability. This is really the most important part of
third party’s location are diminished. Often these control the risk equation, because without the potential for loss,
deficiencies need to be aggregated into categories of there truly is no risk.
control deficiencies/failures in order to analyze them at
Whatever the findings from the third-party assessment,
the appropriate level. For example, in the second example
they are typically expressed in the form of a control
risk statement, software vulnerabilities may encapsulate
deficiency (as part of an overall risk statement). These
unpatched systems, zero-day vulnerabilities,
control deficiencies and failures need to be mapped to a
misconfigurations or installation of remote services tools.
corresponding risk scenario to ensure that the risk
Depending on the level of abstraction that the enterprise
associated with these control deficiencies is appropriately
requires, it can aggregate these control deficiencies
rated.
together into a high-level category, such as access control
Threat Modeling
Threat modeling is an important part of the risk analysis • What is the danger of discovery posed to that threat agent
process. It is important to identify the actors in a loss while it is attempting to compromise those assets?
scenario (not necessarily with the same level of rigor as • What perceived value may enterprise data at the third party hold
process). It is important to understand which third-party • What skills does an adversary need to succeed in
controls are successful at defending against the compromising third-party systems and accessing enterprise
communities. It is important to understand which third- • How much time does an adversary need to compromise
party controls address attacks associated with various systems and access data? What resources and materials does
threat communities. In some cases, controls may address the adversary need?
threats from more than one source; for example, the same • What level of effort is required overall from the threat agent to
control that addresses rogue nation states may also compromise the third party?
defend against cybercriminals. Overlapping controls in The answers to these questions can be collected in a
this sense should be noted in the threat model. threat profile and maintained for each threat community
identified by the enterprise . The profile can be correlated
Other questions to answer when threat modeling include:
to risk statements, third parties and business processes
• How often will threat agents encounter enterprise assets at the
to gain a clearer picture of end-to-end enterprise risk.
third-party location?
remediation of findings.
< $10k
< 1 in 10 years 1 in 10 years 1 per year 2 – 10 per year > 10 per year
Likelihood of Occurrence
Source: Freund, J.; J. Jones; Measuring and Managing Information Risk: A FAIR
Approach, Butterworth-Heinemann, USA, 2014,
https://www.elsevier.com/books/measuring-and-managing-information-
risk/freund/978-0-12-420231-3
26
26
Hubbard, D.; D. Evans; “Problems with scoring methods and ordinal scales in risk assessment,” IBM, Journal of Research and Development, vol. 54, no. 3,
paper 2, May/June 2010, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.163.4544&rep=rep1&type=pdf
Conclusion
Third-party risk management is a critical component of an Conducting regular reviews of third-party controls and
overall vendor management program. As more addressing control gaps and deficiencies ensure that data
enterprises rely on third parties to help deliver their and service protection is commensurate with the risk that
products and services, third-party risk management will third-party activities pose to the enterprise. Many
only become more critical over time. Building good technologies and software platforms can help to expedite
enterprise processes, governance and hygiene around and automate these review processes. Risk ratings are
third-party management is an important initial step to assigned to third parties, criticality to control deficiencies,
ensure that third parties are properly vetted before and gaps are managed through a closeout process that
sending data to them. This effort helps to ensure that allows an enterprise to properly manage the third party,
contracts—including data privacy and security influence future terms and conditions of the contract, and
agreements—are executed, and that enterprise data can protect enterprise interests. Managing third-party risk is a
be presumed reasonably safe under the purview of third critical aspect of cybersecurity programs overall, as the
parties. digital walls separating enterprises from third parties are
lowered and the world becomes more interconnected.
Acknowledgments
ISACA would like to acknowledge:
Internal Audit Manager, Ernst Young, Health Care Service Corporation, USA
United Kingdom
R.V. Raghu
James C. Samans CISA, CRISC
CISA, CRISC, CISM, CBCP, CPP, CIPT, Versatilist Consulting India Pvt. Ltd., India
CISSP-ISSEP, PMP
Gabriela Reynaga
Director of Information Systems Security,
CISA, CRISC, COBIT 5 Foundation, GRCP
American Institutes for Research, USA
Holistics GRC, Mexico
Scott Solomon
Gregory Touhill
CIPM, CIPP/E
CISM, CISSP
Product Marketing Manager, OneTrust,
Cyxtera Federal Group, USA
USA
Asaf Weisberg
CISA, CRISC, CISM, CGEIT
introSight Ltd., Israel
Tichaona Zororo
CISA, CRISC, CISM, CGEIT, COBIT 5
Assessor, CIA, CRMA
EGIT | Enterprise Governance of IT (Pty)
Ltd, South Africa
Rob Clyde
ISACA Board Chair, 2018-2019
CISM
Clyde Consulting LLC, USA
About ISACA
Now in its 50th-anniversary year, ISACA® (isaca.org) is a global association
1700 E. Golf Road, Suite 400
helping individuals and enterprises achieve the positive potential of
Schaumburg, IL 60173, USA
technology. Today’s world is powered by information and technology, and
ISACA equips professionals with the knowledge, credentials, education and
Phone: +1.847.660.5505
community to advance their careers and transform their organizations. ISACA
leverages the expertise of its 460,000 engaged professionals—including its Fax: +1.847.253.1755
140,000 members—in information and cybersecurity, governance, assurance,
Support: support.isaca.org
risk and innovation, as well as its enterprise performance subsidiary, CMMI®
Institute, to help advance innovation through technology. ISACA has a Website: www.isaca.org
presence in more than 188 countries, including more than 220 chapters
worldwide and offices in both the United States and China.
OneTrust® is the #1 most widely used privacy, security and third-party risk www.isaca.org/managing-third-party-
technology platform, trusted by more than 3,000 companies to comply with risk
the CCPA, GDPR, ISO 27001 and hundreds of the world’s privacy and
security laws. OneTrust’s three primary offerings include OneTrust Privacy Participate in the ISACA Online
LinkedIn:
DISCLAIMER www.linkedin.com/company/isaca
RESERVATION OF RIGHTS
Managing Third-party Risk: Cyberrisk Practices for Better Enterprise Risk Management
A Centralized Risk Management Platform for Global Security and Privacy Professionals
Third-party vendor risk management isn’t a new concept, yet
the risks posed to enterprises have evolved. Increasing reliance
on third parties, new privacy regulations, shifting cybersecurity
threats, and frequent data breaches have upended the
third-party risk management landscape. OneTrust Vendor Risk
Management is a purpose-built security and privacy solution
that directly addresses these challenges and many others.
Risk Assessment Automation Vendorpedia™ Third-Party Risk Exchange Third-Party Threat Monitoring
Assess and mitigate Exchange pre-completed third-party Monitor security and privacy
third-party vendor risks in less vendor risk assessments and access threats over time to maintain a watchful
time and with better results research on 6,000+ global vendors eye on third-party vendors