Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

TrustArc
TrustArcTrustArc
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Mitigating Third-Party Risks:
Best Practices for CISOs in
Ensuring Robust Security
and Privacy Measures
2
Speakers
Paul Iagnocco
Customer Enablement Lead &
Principal, Data Privacy,
TrustArc
Martin Gomberg
CISSP, CIPP/E
a.k.a. The Privacy CIO
Author CISO Redefined
Agenda
○ Whatʼs the current state of risk management?
○ Who owns third-party risk in the organization?
○ What are we solving for?
○ What are organizational implications around third-party risk?
○ What are the unique implications for Cloud Processing?
○ Questions & Answers
What’s the
current state of
risk management?
5
Privilege is trust, and trust is the cost of doing business.
Our accountability and risk has increased even as our most consequential
data moves out of our control, and a cautious trust is placed in others.
Trust increasingly involves more parties, spans technologies,
spans geographies, changing regulations, and legal jurisdictions.
Our protection is paper, contracts, or TOS check boxes, less technology,
and with less visibility to risks and effectiveness of controls.
We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt
in the system. There are things about our third-party relationships that we simply cannot know.
Who owns
third-party risk in
the organization?
7
Who should own third-party risk management (TPRM)?
• TPRM is a growing strategic priority in most organizations
• TPRM is often decentralized due to size, complexity and budgetary constraints
• There are challenges:
○ Lack of a comprehensive approach
○ Siloed focus on specific risks
○ Insufficient and inefficient for collaboration
○ Missed opportunities
8
Third-party risk touches an organization everywhere
● Executives and line of business management make strategic decisions about aligning, merging,
acquiring, or partnering with other businesses.
● Line of business and procurement managers in acquiring products or services.
● Compliance scrutinizes partners, supply chain and proposed transactions for red flags.
● Legal in the effectiveness and protection of our contracts.
● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent.
● IT in the integration of networks and the movement of data.
● InfoSec in establishing defenses against malicious or unintentional introduction of threats.
● Privacy the movement of data between individuals, entities, and countries and whether the flows of
data conform to local regulations.
Who should own third-party risk management (TPRM)?
9
Stakeholders and Roles
Stakeholders
in Adopting
Third-Party
Relationships
Business
and
Executive
Legal & Human
Resources
Procurement
Operations
& Continuity
Finance
Security
Contracts
Privacy
and Risk
Affiliates &
Partnerships
Service
Procurement
Product
Purchase
Contractors
Merger
Outsourcing
Acquisition
Fraud
Prevention
● Recruitment
● Advisory
● Ops Management
● Security
Prohibited Entities
Entities Under
Sanctions
● Consultants
● Temps
● Vendors
● Brokers
● Suppliers
● Manufacturing
● Sales
● Distribution & Fulfill
● Development
● Strategic
● Infrastructure
● As a service
● Commodity
What are we
solving for?
11
But is there really such a thing as a third-party risk?
● It is third-party risk if it originates from, channels through, or impacts a partner.
● Modern business does not operate in a vacuum. Each component of our value chain in turn
participates with others in a chain of dependencies. There is no risk that is not third-party
risk to someone. There is nothing that we do that does not involve third or n tier parties.
● We are a third-party to someone in our value chain. The same risks that impact us,
and through us threaten other parties, are the same risks that potentially impact our partners,
and through them, threaten us.
● We need to require of them, what we require of us.
INTERNAL ONLY
We and our
network of
partners, theirs, the
technologies we
use, and the
environment in
which we operate
together are a
system, and one
part exposed…
risks others.
… Many companies, even well-known
companies, have not undertaken, completed,
or maintained an inventory and catalog of
the location and classification of the data in
their:
1. environment, or;
2. their material risks.
And therefore have not assessed the value
and sensitivity, or the business
confidentiality, of the data assets they
collect, store or process in house, or are held,
or are serviced on their behalf by
third-parties.
What are
organizational
implications around
third-party risk?
14
When does a third-party risk become core to our risk?
● It is core to our risk if our partners cannot sustain an adequately protected environment.
● If an impact to them disrupts their ability to meet their obligations to us.
● If it impacts them financially shaking our confidence in the relationship.
● If our clients lose trust in us because of the third-party relationship.
● If through accident, carelessness, or malicious acts they are a conduit of attack.
● If our partners violation of compliance with contracts, laws, or duty of care impacts our
clientʼs, their data, or their trust of us.
● In any violation of the law.
15
Due Diligence and Red Flags
Assessing an Organization Assessing a Product or Service
Oversight and accountability Focus, expertise and track record
Leadership and vision Capacity to deliver and commitment to product
Environment and culture Product or service quality and direction
Controls and metrics Planned product support and investment
Policies and practices Staffing, skills & turnover
Technology and infrastructure Technology, Privacy, Operations & Continuity
Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership)
Awareness and education Hardware and software verified and cleared sourcing
Reputation and references Conformance to standards and regulation
Financial Health Cost, and payment terms
Supply Chain Integrity Contract and favorability of terms
16
Business is not static, for us, or for
third-party partners. With business
change, risk moves. Static assessments
are a statement in time. Validity of the
assessment changes because business
is not static, and risk moves. This is true
for our third-party and n-tier partners as
much as it is for ourselves.
Assessment is a reiterative process of
risk classification, address and
review.
Business
Objectives
Material risks
to objectives
Mitigating
Controls
Validation of
Effectiveness
Ongoing Monitoring Internal and Third-Party Risk
17
Regardless of industry, structure, or
relationship, and whether a product,
service, or behavior, and whether
effectiveness is initially assessed
through inquiry, attestation, forms
or checklist, contract, technology,
or onsite audit,
a cadence for periodic review should
be established, the frequency of
sampling or revisitation consistent
with the risk, and with risk tolerance.
Presence of
Controls
Adequacy
of Controls
Frequency
of Use or
Testing
Validation of
Effectiveness
Four Conditions of Effectiveness – Identify, Address, Verify and Prove
18
When entering into a third-party Data Processing Agreement (DPA) for cloud
services, important considerations include:
● Defining engagement specifics
● Ensuring GDPR compliance (Article 28)
● Establishing roles
● Specifying instructions
● Adhering to standards
● Detailing data aspects
● Outlining procedures
● Defining processes for data breach and Data Subject Request support.
● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization
Cloud Processing
Q&A
20
TrustArc TPRM Solutions
trustarc.com/assessment-manager/ trustarc.com/risk-profile/
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Contact Information
Visit http://www.trustarc.com for more
information on how TrustArc can help.
1 de 21

Recomendados

Cybersecurity: How To Protect Your Law Firm Data por
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataRocket Matter, LLC
1.6K visualizações32 slides
Overcoming Hidden Risks in a Shared Security Model por
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
100 visualizações23 slides
Data Privacy: The Hidden Beast within Mergers & Acquisitions por
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
138 visualizações24 slides
Cyber Risk in the Energy Industry por
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryTim Christ Executive Leadership
110 visualizações19 slides
eCrime-report-2011-accessible por
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
346 visualizações31 slides
Third-Party Risk Management: How to Identify, Assess & Act por
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActTrustArc
369 visualizações28 slides

Mais conteúdo relacionado

Similar a Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

Standards in Third Party Risk - DVV Solutions ISACA North May 19 por
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk Management
327 visualizações29 slides
Tackling the-challenges-of-third-party-risk-management por
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
152 visualizações8 slides
Data Security, Privacy and Information Governance: Initial Risk Assessment por
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk AssessmentCohenGrigsby
19 visualizações2 slides
Nymity Framework: Privacy & Data Protection Update in 7 States por
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
228 visualizações22 slides
How to Manage Vendors and Third Parties to Minimize Privacy Risk por
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
613 visualizações22 slides
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... por
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
4K visualizações30 slides

Similar a Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures(20)

Tackling the-challenges-of-third-party-risk-management por Charles Steve
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
Charles Steve152 visualizações
Data Security, Privacy and Information Governance: Initial Risk Assessment por CohenGrigsby
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk Assessment
CohenGrigsby19 visualizações
Nymity Framework: Privacy & Data Protection Update in 7 States por TrustArc
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc228 visualizações
How to Manage Vendors and Third Parties to Minimize Privacy Risk por TrustArc
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc613 visualizações
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... por Giulio Coraggio
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
Giulio Coraggio4K visualizações
Maritime Cyber Security por Dimitris Chalambalis
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
Dimitris Chalambalis3.2K visualizações
Cyber Security Risk Management por Shaun Sloan
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan137 visualizações
Third Party Risk Management por banerjeerohit
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
banerjeerohit206 visualizações
The 5 Steps to Managing Third-party Risk por Elizabeth Dimit
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
Elizabeth Dimit56 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por aparnatikekar4
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
aparnatikekar449 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por Nina Yadav
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Nina Yadav77 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por gauravmiishra701
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
gauravmiishra70131 visualizações
Forensic Services and Global Experience:the Intelligent Connection - EY India por karthikswamii
Forensic Services and Global Experience:the Intelligent Connection - EY IndiaForensic Services and Global Experience:the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY India
karthikswamii185 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por SadanandGahivare
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
SadanandGahivare38 visualizações
Evolution of Forensic Data Analytics - EY India por karthikswamii
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
karthikswamii77 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya50 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por sathish kriishnan
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
sathish kriishnan58 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya66 visualizações
Forensic Services and Global Experience: the Intelligent Connection - EY India por sathish kriishnan
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
sathish kriishnan111 visualizações

Mais de TrustArc

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
77 visualizações29 slides
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security por
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
108 visualizações22 slides
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... por
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
260 visualizações33 slides
CBPR - Navigating Cross-Border Data Privacy Compliance por
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
313 visualizações11 slides
Everything You Need to Know about DPF But Are Afraid to Ask.pdf por
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
1K visualizações12 slides
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... por
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
272 visualizações32 slides

Mais de TrustArc(20)

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc77 visualizações
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security por TrustArc
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc108 visualizações
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... por TrustArc
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc260 visualizações
CBPR - Navigating Cross-Border Data Privacy Compliance por TrustArc
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc313 visualizações
Everything You Need to Know about DPF But Are Afraid to Ask.pdf por TrustArc
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc1K visualizações
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... por TrustArc
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc272 visualizações
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations por TrustArc
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc177 visualizações
Building Trust and Competitive Advantage: The Value of Privacy Certifications por TrustArc
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc218 visualizações
The California Age Appropriate Design Code Act Navigating the New Requirement... por TrustArc
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc51 visualizações
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf por TrustArc
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc152 visualizações
Artificial Intelligence Bill of Rights: Impacts on AI Governance por TrustArc
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc388 visualizações
How To Do Data Transfers Between EU-US in 2023 por TrustArc
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc301 visualizações
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust por TrustArc
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
TrustArc106 visualizações
The Cost of Privacy Teams: What Your Business Needs To Know por TrustArc
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
TrustArc306 visualizações
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf por TrustArc
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc318 visualizações
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy? por TrustArc
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc153 visualizações
Why Your Company Needs A Privacy Culture & Where To Start por TrustArc
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
TrustArc252 visualizações
Data Privacy Perspectives: Get Answers to Your Privacy Questions por TrustArc
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsData Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy Questions
TrustArc133 visualizações
TrustArc Webinar: DPIA Compliance por TrustArc
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
TrustArc177 visualizações
TrustArc Webinar: 2023 Privacy Roadmap por TrustArc
TrustArc Webinar: 2023 Privacy RoadmapTrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy Roadmap
TrustArc146 visualizações

Último

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...Jasper Oosterveld
28 visualizações49 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 visualizações69 slides
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
131 visualizações23 slides
Kyo - Functional Scala 2023.pdf por
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdfFlavio W. Brasil
434 visualizações92 slides
Business Analyst Series 2023 - Week 3 Session 5 por
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5DianaGray10
369 visualizações20 slides
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TShapeBlue
56 visualizações34 slides

Último(20)

ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... por Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Jasper Oosterveld28 visualizações
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 visualizações
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue por ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue131 visualizações
Kyo - Functional Scala 2023.pdf por Flavio W. Brasil
Kyo - Functional Scala 2023.pdfKyo - Functional Scala 2023.pdf
Kyo - Functional Scala 2023.pdf
Flavio W. Brasil434 visualizações
Business Analyst Series 2023 - Week 3 Session 5 por DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10369 visualizações
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T por ShapeBlue
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&TCloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
CloudStack and GitOps at Enterprise Scale - Alex Dometrius, Rene Glover - AT&T
ShapeBlue56 visualizações
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue119 visualizações
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue por ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue96 visualizações
Uni Systems for Power Platform.pptx por Uni Systems S.M.S.A.
Uni Systems for Power Platform.pptxUni Systems for Power Platform.pptx
Uni Systems for Power Platform.pptx
Uni Systems S.M.S.A.58 visualizações
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R... por ShapeBlue
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
Setting Up Your First CloudStack Environment with Beginners Challenges - MD R...
ShapeBlue54 visualizações
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... por Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro29 visualizações
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray1080 visualizações
NTGapps NTG LowCode Platform por Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu141 visualizações
State of the Union - Rohit Yadav - Apache CloudStack por ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue145 visualizações
DRBD Deep Dive - Philipp Reisner - LINBIT por ShapeBlue
DRBD Deep Dive - Philipp Reisner - LINBITDRBD Deep Dive - Philipp Reisner - LINBIT
DRBD Deep Dive - Philipp Reisner - LINBIT
ShapeBlue62 visualizações
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ... por ShapeBlue
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
Backroll, News and Demo - Pierre Charton, Matthias Dhellin, Ousmane Diarra - ...
ShapeBlue83 visualizações
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue por ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue85 visualizações
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue111 visualizações
Microsoft Power Platform.pptx por Uni Systems S.M.S.A.
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptx
Uni Systems S.M.S.A.67 visualizações
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue por ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue46 visualizações

Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

  • 1. © 2023 TrustArc Inc. Proprietary and Confidential Information. Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures
  • 2. 2 Speakers Paul Iagnocco Customer Enablement Lead & Principal, Data Privacy, TrustArc Martin Gomberg CISSP, CIPP/E a.k.a. The Privacy CIO Author CISO Redefined
  • 3. Agenda ○ Whatʼs the current state of risk management? ○ Who owns third-party risk in the organization? ○ What are we solving for? ○ What are organizational implications around third-party risk? ○ What are the unique implications for Cloud Processing? ○ Questions & Answers
  • 4. What’s the current state of risk management?
  • 5. 5 Privilege is trust, and trust is the cost of doing business. Our accountability and risk has increased even as our most consequential data moves out of our control, and a cautious trust is placed in others. Trust increasingly involves more parties, spans technologies, spans geographies, changing regulations, and legal jurisdictions. Our protection is paper, contracts, or TOS check boxes, less technology, and with less visibility to risks and effectiveness of controls. We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt in the system. There are things about our third-party relationships that we simply cannot know.
  • 6. Who owns third-party risk in the organization?
  • 7. 7 Who should own third-party risk management (TPRM)? • TPRM is a growing strategic priority in most organizations • TPRM is often decentralized due to size, complexity and budgetary constraints • There are challenges: ○ Lack of a comprehensive approach ○ Siloed focus on specific risks ○ Insufficient and inefficient for collaboration ○ Missed opportunities
  • 8. 8 Third-party risk touches an organization everywhere ● Executives and line of business management make strategic decisions about aligning, merging, acquiring, or partnering with other businesses. ● Line of business and procurement managers in acquiring products or services. ● Compliance scrutinizes partners, supply chain and proposed transactions for red flags. ● Legal in the effectiveness and protection of our contracts. ● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent. ● IT in the integration of networks and the movement of data. ● InfoSec in establishing defenses against malicious or unintentional introduction of threats. ● Privacy the movement of data between individuals, entities, and countries and whether the flows of data conform to local regulations. Who should own third-party risk management (TPRM)?
  • 9. 9 Stakeholders and Roles Stakeholders in Adopting Third-Party Relationships Business and Executive Legal & Human Resources Procurement Operations & Continuity Finance Security Contracts Privacy and Risk Affiliates & Partnerships Service Procurement Product Purchase Contractors Merger Outsourcing Acquisition Fraud Prevention ● Recruitment ● Advisory ● Ops Management ● Security Prohibited Entities Entities Under Sanctions ● Consultants ● Temps ● Vendors ● Brokers ● Suppliers ● Manufacturing ● Sales ● Distribution & Fulfill ● Development ● Strategic ● Infrastructure ● As a service ● Commodity
  • 11. 11 But is there really such a thing as a third-party risk? ● It is third-party risk if it originates from, channels through, or impacts a partner. ● Modern business does not operate in a vacuum. Each component of our value chain in turn participates with others in a chain of dependencies. There is no risk that is not third-party risk to someone. There is nothing that we do that does not involve third or n tier parties. ● We are a third-party to someone in our value chain. The same risks that impact us, and through us threaten other parties, are the same risks that potentially impact our partners, and through them, threaten us. ● We need to require of them, what we require of us.
  • 12. INTERNAL ONLY We and our network of partners, theirs, the technologies we use, and the environment in which we operate together are a system, and one part exposed… risks others. … Many companies, even well-known companies, have not undertaken, completed, or maintained an inventory and catalog of the location and classification of the data in their: 1. environment, or; 2. their material risks. And therefore have not assessed the value and sensitivity, or the business confidentiality, of the data assets they collect, store or process in house, or are held, or are serviced on their behalf by third-parties.
  • 14. 14 When does a third-party risk become core to our risk? ● It is core to our risk if our partners cannot sustain an adequately protected environment. ● If an impact to them disrupts their ability to meet their obligations to us. ● If it impacts them financially shaking our confidence in the relationship. ● If our clients lose trust in us because of the third-party relationship. ● If through accident, carelessness, or malicious acts they are a conduit of attack. ● If our partners violation of compliance with contracts, laws, or duty of care impacts our clientʼs, their data, or their trust of us. ● In any violation of the law.
  • 15. 15 Due Diligence and Red Flags Assessing an Organization Assessing a Product or Service Oversight and accountability Focus, expertise and track record Leadership and vision Capacity to deliver and commitment to product Environment and culture Product or service quality and direction Controls and metrics Planned product support and investment Policies and practices Staffing, skills & turnover Technology and infrastructure Technology, Privacy, Operations & Continuity Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership) Awareness and education Hardware and software verified and cleared sourcing Reputation and references Conformance to standards and regulation Financial Health Cost, and payment terms Supply Chain Integrity Contract and favorability of terms
  • 16. 16 Business is not static, for us, or for third-party partners. With business change, risk moves. Static assessments are a statement in time. Validity of the assessment changes because business is not static, and risk moves. This is true for our third-party and n-tier partners as much as it is for ourselves. Assessment is a reiterative process of risk classification, address and review. Business Objectives Material risks to objectives Mitigating Controls Validation of Effectiveness Ongoing Monitoring Internal and Third-Party Risk
  • 17. 17 Regardless of industry, structure, or relationship, and whether a product, service, or behavior, and whether effectiveness is initially assessed through inquiry, attestation, forms or checklist, contract, technology, or onsite audit, a cadence for periodic review should be established, the frequency of sampling or revisitation consistent with the risk, and with risk tolerance. Presence of Controls Adequacy of Controls Frequency of Use or Testing Validation of Effectiveness Four Conditions of Effectiveness – Identify, Address, Verify and Prove
  • 18. 18 When entering into a third-party Data Processing Agreement (DPA) for cloud services, important considerations include: ● Defining engagement specifics ● Ensuring GDPR compliance (Article 28) ● Establishing roles ● Specifying instructions ● Adhering to standards ● Detailing data aspects ● Outlining procedures ● Defining processes for data breach and Data Subject Request support. ● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization Cloud Processing
  • 19. Q&A
  • 21. © 2023 TrustArc Inc. Proprietary and Confidential Information. Contact Information Visit http://www.trustarc.com for more information on how TrustArc can help.