SlideShare uma empresa Scribd logo
1 de 23
Why? and How?
 Does Commercial Off the Shelf Software introduce risk to your
environment?
 Do commercially produced hardware products introduce risk
 Does the security culture of the organization providing software,
hardware and services have anything to do with your risk?
 Do fourth party relationships matter?
 Culture of Security
 It is critical that an organization have a “Culture of Security”
 What is a “Culture of Security”
 Culture - the quality in a person or society that arises from a concern for what is
regarded as excellent in arts, letters, manners, scholarly pursuits, etc.
 Culture of Security is embedded in the daily operation of the organization so that it
becomes a norm and not an exception
 The culture of security drives the practices of an organization
 It’s deeper than just having AV and IDS/IPS
 Includes mature policies, standards and practices
 Product and Services Risk
 Every product or service introduces risk
 Network interfaces and access to you
 Poor coding practices
 Vendor systems
 Personnel activities
 Fourth party participation
 Fourth Party Relationships
 Where are they located
 Do they have a “Culture of Security”
 Does your Third Party have a security contract or understanding with
their third party providers?
 Identify Framework/Methodology
 Determination
 Risk Rank
 Risk Assessments
 Contractual Agreements
 Identify Framework/Methodology
 There are many ways to determine and manage risk
 NIST SP 800-161 (Supply Chain Risk Management (SCRM) for Information
and Communications Technology)
 National Strategy for Global Supply Chain Security
 Cloud Security Alliance
 Shared Assessments Standard Information Gathering (SIG) and Agreed Upon
Procedures (AUP)
 Determination Questionnaire
 Not all relationships require intense scrutiny
 You must determine which do and which don’t
 Short questionnaire
 High level evaluation of risk
 Groundskeepers
 Cleaning teams
 Service personnel
 Construction crews
 Does the vendor store, process, transmit or access systems or data?
 Does the vendor have logical or physical access to facilities?
 Can the vendor directly or indirectly impact your business availability?
 Does the engagement create, modify or purchase software and/or hardware?
 Are any of the above criteria met before, during or after implementation of the
products or services?
1) What type of data will the Third Party potentially process, store,
transmit, or have access to, as part of this engagement?
2) What is the greatest daily average quantity of records/account
information of which this engagement scope will send, receive, process,
store or have access to before, during or after implementation?
3) What is the frequency at which this engagement scope will send,
receive, process, store or have access to before, during or after
implementation?
4) Does this engagement scope include any type of data-
sharing/user/admin/database access OR inbound connectivity to your
corporate network OR outbound connectivity from corporate network
with the third party before, during or after implementation?
5) Does this engagement scope include physical access by Third Party
personnel to your facilities before, during or after implementation?
6) Does this engagement scope involve creation of new services and/or
changes to existing services?
7) Does this engagement scope involve the creation/modification of
software applications and/or the deployment of new devices/IT
infrastructure?
8) Does this engagement scope include offshore (offshore=outside
continental U.S.) facilities or personnel involvement of any kind before,
during or after implementation or use of any products and/or service(s)
involved? (Consider sending, receiving, processing, storing data / any
access at any time / software development)
9) Does this engagement scope include inbound and/or outbound
connectivity and/or data sharing with other external parties
(vendors/partners of this vendor) before, during or after
implementation?
10) Is a cloud solution utilized from this vendor?
11) Is a mobile solution utilized from this vendor as part of this engagement
scope?
12) How many "Fourth Party" vendors will have access to Third Party data
or facilities and/or your corporate data or facilities as part of this
engagement scope?
15) What is the vendor's most recent annual income?
16) Has the vendor recently gone through a merger, acquisition, or
divestiture?
17) Will the vendor’s services include performing any transactions on behalf
of your company or your subsidiary entities?
18) What is the volume of transactions per day the vendor will perform on
behalf of your company or your subsidiary entities?
19) What is the daily value of the transactions performed by the vendor on
behalf of your company or your subsidiary entities?
20) What is the current Disaster Recovery (DR) Tier?
22) What is the current Business Impact Analysis (BIA)?
23) Does this vendor provide services that are customer facing?
24) Are there any (public or private) known issues, findings or concerns?
25) Is this vendor a strategic vendor for your company?
26) Known count of viable alternative vendors?
24) What concentration of this Line of Business‘ cumulative business
position is represented by this specific project/engagement scope?
(percentage estimate / response optional)
25) What is the currently projected utilization term for this vendor?
 Risk Rank
 After you have determined whether an assessment is needed
 Level of scrutiny
 On-site
 Frequency of review
 Risk Assessments
 Perform your assessment
 Use the framework you chose
 Create a scoring model
 Maintain record of assessments
 Follow up on findings
 Create process to document risk acceptance
 Maintain timelines for remediation
 Document when remediation has been completed
 Provide a path forward to the business through Risk Acceptance/Risk Remediation
 Assessments can be done at various levels
 Contract only
 Lite assessments (Questionnaire)
 Heavy Assessments (Questionnaire)
 On-site Assessments
 One of the most frequently selected options is:
 Shared Assessments Standard Information Gathering Questionnaire
(SIG) Lite and Full
 Questionnaire submitted to vendors to assess control effectiveness
 Evidence is collected in support of the answers provided
 Sometimes evidence is viewed but not physically received
 On-site Assessments using Agreed Upon Procedures (AUP)
 Guideline for on-site assessments
 Shared Assessments SIG Lite and SIG Full
 A. Risk Management
 B. Security Policy
 C. Organizational Security
 D. Asset Management
 E. Human Resource Security
 F. Physical and Environmental
 G. Communications and Operations Management
 H. Access Control
 I. Information Systems Acquisition Development & Maintenance
 J. Incident, Event & Communications Management
 K. Business Continuity and Disaster Recovery
 L. Compliance
 M. Mobile
 P. Privacy
 Q. Software Security
 V. Cloud Security
 Z. Additional Questions
 Contractual Agreements
 Should be included with every contract (based on determination)
 Should be negotiable
 Should be general enough to allow flexibility, but specific enough to
ensure security
 Should ensure accountability
Jeffrey Sweet - Third Party Risk Governance - Why? and How?

Mais conteúdo relacionado

Mais procurados

Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
EnergySec
 

Mais procurados (20)

Keith Fricke - CISO for an Hour
Keith Fricke - CISO for an HourKeith Fricke - CISO for an Hour
Keith Fricke - CISO for an Hour
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Deral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail LaterDeral Heiland - Fail Now So I Don't Fail Later
Deral Heiland - Fail Now So I Don't Fail Later
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
Jason Harrell - Compliance and Security: Building a Cybersecurity Risk Manage...
 
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No ShoesCarolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
Carolyn Engstrom - IT Data Analytics: Why the Cobbler's Children Have No Shoes
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
NESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development PresentationNESCO Town Hall Workforce Development Presentation
NESCO Town Hall Workforce Development Presentation
 
Dynamic Cyber Defense
Dynamic Cyber DefenseDynamic Cyber Defense
Dynamic Cyber Defense
 
Achieving Compliance Through Security
Achieving Compliance Through SecurityAchieving Compliance Through Security
Achieving Compliance Through Security
 
Security Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of SecuritySecurity Program Guidance and Establishing a Culture of Security
Security Program Guidance and Establishing a Culture of Security
 
Cybersecurity solution-guide
Cybersecurity solution-guideCybersecurity solution-guide
Cybersecurity solution-guide
 
Building Human Intelligence – Pun Intended
Building Human Intelligence – Pun IntendedBuilding Human Intelligence – Pun Intended
Building Human Intelligence – Pun Intended
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber ResiliencyEnergy Industry Organizational Strategies to Increase Cyber Resiliency
Energy Industry Organizational Strategies to Increase Cyber Resiliency
 
Integrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator DisplayIntegrating Cyber Security Alerts into the Operator Display
Integrating Cyber Security Alerts into the Operator Display
 
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea AlmeidaNTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
NTXISSACSC1 Conference - Cybersecurity 2014 by Andrea Almeida
 
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced ScorecardHow to Build Your Own Cyber Security Framework using a Balanced Scorecard
How to Build Your Own Cyber Security Framework using a Balanced Scorecard
 
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon SwainNTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
NTXISSACSC2 - Bring Your Own Device: The Great Debate by Brandon Swain
 
CISO's first 100 days
CISO's first 100 daysCISO's first 100 days
CISO's first 100 days
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 

Semelhante a Jeffrey Sweet - Third Party Risk Governance - Why? and How?

EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
Anita Amelia
 
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.pptTaiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
gealehegn
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
Ron Miller
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
christiandean12115
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
ciso_insights
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
Mordecai Kraushar
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
nooralmousa
 

Semelhante a Jeffrey Sweet - Third Party Risk Governance - Why? and How? (20)

Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Maturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key ConsiderationsMaturing Endpoint Security: 5 Key Considerations
Maturing Endpoint Security: 5 Key Considerations
 
EHS Software Buyer Checklist
EHS Software Buyer ChecklistEHS Software Buyer Checklist
EHS Software Buyer Checklist
 
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.pptTaiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
Taiwan_2wehuikl;lkjjk;ivfazzfffggggh.ppt
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Convergence innovative integration of security
Convergence   innovative integration of securityConvergence   innovative integration of security
Convergence innovative integration of security
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
GDPR Series Session 4
GDPR Series Session 4GDPR Series Session 4
GDPR Series Session 4
 
Audit Practice at CipherTechs
Audit Practice at CipherTechsAudit Practice at CipherTechs
Audit Practice at CipherTechs
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Proactive information security michael
Proactive information security michael Proactive information security michael
Proactive information security michael
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Cmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEWCmgt 400 Entire Course NEW
Cmgt 400 Entire Course NEW
 
CMGT 400 Entire Course NEW
CMGT 400 Entire Course NEWCMGT 400 Entire Course NEW
CMGT 400 Entire Course NEW
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 

Mais de centralohioissa

Mais de centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50Jim Libersky: Cyber Security - Super Bowl 50
Jim Libersky: Cyber Security - Super Bowl 50
 
Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!Jim Wojno: Incident Response - No Pain, No Gain!
Jim Wojno: Incident Response - No Pain, No Gain!
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
Jessica Hebenstreit - Don't Try This At Home! (Things Not To Do When Securing...
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's EnterpriseJustin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
Justin Harvey - Apple vs DOJ: Privacy in Today's Enterprise
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Jeffrey Sweet - Third Party Risk Governance - Why? and How?

  • 2.  Does Commercial Off the Shelf Software introduce risk to your environment?  Do commercially produced hardware products introduce risk  Does the security culture of the organization providing software, hardware and services have anything to do with your risk?  Do fourth party relationships matter?
  • 3.  Culture of Security  It is critical that an organization have a “Culture of Security”  What is a “Culture of Security”  Culture - the quality in a person or society that arises from a concern for what is regarded as excellent in arts, letters, manners, scholarly pursuits, etc.  Culture of Security is embedded in the daily operation of the organization so that it becomes a norm and not an exception  The culture of security drives the practices of an organization  It’s deeper than just having AV and IDS/IPS  Includes mature policies, standards and practices
  • 4.  Product and Services Risk  Every product or service introduces risk  Network interfaces and access to you  Poor coding practices  Vendor systems  Personnel activities  Fourth party participation
  • 5.  Fourth Party Relationships  Where are they located  Do they have a “Culture of Security”  Does your Third Party have a security contract or understanding with their third party providers?
  • 6.  Identify Framework/Methodology  Determination  Risk Rank  Risk Assessments  Contractual Agreements
  • 7.  Identify Framework/Methodology  There are many ways to determine and manage risk  NIST SP 800-161 (Supply Chain Risk Management (SCRM) for Information and Communications Technology)  National Strategy for Global Supply Chain Security  Cloud Security Alliance  Shared Assessments Standard Information Gathering (SIG) and Agreed Upon Procedures (AUP)
  • 8.  Determination Questionnaire  Not all relationships require intense scrutiny  You must determine which do and which don’t  Short questionnaire  High level evaluation of risk  Groundskeepers  Cleaning teams  Service personnel  Construction crews
  • 9.  Does the vendor store, process, transmit or access systems or data?  Does the vendor have logical or physical access to facilities?  Can the vendor directly or indirectly impact your business availability?  Does the engagement create, modify or purchase software and/or hardware?  Are any of the above criteria met before, during or after implementation of the products or services?
  • 10. 1) What type of data will the Third Party potentially process, store, transmit, or have access to, as part of this engagement? 2) What is the greatest daily average quantity of records/account information of which this engagement scope will send, receive, process, store or have access to before, during or after implementation? 3) What is the frequency at which this engagement scope will send, receive, process, store or have access to before, during or after implementation? 4) Does this engagement scope include any type of data- sharing/user/admin/database access OR inbound connectivity to your corporate network OR outbound connectivity from corporate network with the third party before, during or after implementation?
  • 11. 5) Does this engagement scope include physical access by Third Party personnel to your facilities before, during or after implementation? 6) Does this engagement scope involve creation of new services and/or changes to existing services? 7) Does this engagement scope involve the creation/modification of software applications and/or the deployment of new devices/IT infrastructure? 8) Does this engagement scope include offshore (offshore=outside continental U.S.) facilities or personnel involvement of any kind before, during or after implementation or use of any products and/or service(s) involved? (Consider sending, receiving, processing, storing data / any access at any time / software development)
  • 12. 9) Does this engagement scope include inbound and/or outbound connectivity and/or data sharing with other external parties (vendors/partners of this vendor) before, during or after implementation? 10) Is a cloud solution utilized from this vendor? 11) Is a mobile solution utilized from this vendor as part of this engagement scope? 12) How many "Fourth Party" vendors will have access to Third Party data or facilities and/or your corporate data or facilities as part of this engagement scope?
  • 13. 15) What is the vendor's most recent annual income? 16) Has the vendor recently gone through a merger, acquisition, or divestiture? 17) Will the vendor’s services include performing any transactions on behalf of your company or your subsidiary entities? 18) What is the volume of transactions per day the vendor will perform on behalf of your company or your subsidiary entities? 19) What is the daily value of the transactions performed by the vendor on behalf of your company or your subsidiary entities? 20) What is the current Disaster Recovery (DR) Tier?
  • 14. 22) What is the current Business Impact Analysis (BIA)? 23) Does this vendor provide services that are customer facing? 24) Are there any (public or private) known issues, findings or concerns? 25) Is this vendor a strategic vendor for your company? 26) Known count of viable alternative vendors? 24) What concentration of this Line of Business‘ cumulative business position is represented by this specific project/engagement scope? (percentage estimate / response optional) 25) What is the currently projected utilization term for this vendor?
  • 15.  Risk Rank  After you have determined whether an assessment is needed  Level of scrutiny  On-site  Frequency of review
  • 16.  Risk Assessments  Perform your assessment  Use the framework you chose  Create a scoring model  Maintain record of assessments  Follow up on findings  Create process to document risk acceptance  Maintain timelines for remediation  Document when remediation has been completed  Provide a path forward to the business through Risk Acceptance/Risk Remediation
  • 17.  Assessments can be done at various levels  Contract only  Lite assessments (Questionnaire)  Heavy Assessments (Questionnaire)  On-site Assessments
  • 18.  One of the most frequently selected options is:  Shared Assessments Standard Information Gathering Questionnaire (SIG) Lite and Full  Questionnaire submitted to vendors to assess control effectiveness  Evidence is collected in support of the answers provided  Sometimes evidence is viewed but not physically received  On-site Assessments using Agreed Upon Procedures (AUP)  Guideline for on-site assessments
  • 19.  Shared Assessments SIG Lite and SIG Full  A. Risk Management  B. Security Policy  C. Organizational Security  D. Asset Management  E. Human Resource Security  F. Physical and Environmental  G. Communications and Operations Management
  • 20.  H. Access Control  I. Information Systems Acquisition Development & Maintenance  J. Incident, Event & Communications Management  K. Business Continuity and Disaster Recovery  L. Compliance  M. Mobile  P. Privacy
  • 21.  Q. Software Security  V. Cloud Security  Z. Additional Questions
  • 22.  Contractual Agreements  Should be included with every contract (based on determination)  Should be negotiable  Should be general enough to allow flexibility, but specific enough to ensure security  Should ensure accountability