VENDOR MANAGEMENT AND THIRD PARTY RISK
Amy J Butler Legal & General America May 18, 2018
VENDOR MANAGEMENT AND THIRD PARTY RISK Amy J Butler Legal & - - PowerPoint PPT Presentation
VENDOR MANAGEMENT AND THIRD PARTY RISK Amy J Butler Legal & General America May 18, 2018 Todays Presentation ! Definitions ! Why do we need Vendor Risk Management ! Risks Posed by Third Party / Vendor Relationships ! Vendor Risk
Amy J Butler Legal & General America May 18, 2018
! Many organizations push more of their business out to third parties /
! As cybercriminals increasingly target vendors as a vector to attack their
! Corporate Boards are considering third party risk as a top strategic risk. ! Reputational impact. When consumers are personally affected by a third-
! Vendors can play a critical role in a company’s success or failure so
! Regulators have become more focused on how companies are managing
! Generally, regulators consider third-party activities to be at a higher level of
risk than those performed internally because of their physical and operational separation from day-to-day oversight. The risks of TPVM are of particular concern for third parties involved in critical activities – settlements, custodial functions, payments, or information technology.
! Strategic risk - risk arising from adverse business decisions, or the
! Reputation Risk - risk arising from negative public opinion. Third party
! Operational Risk - risk of loss resulting from inadequate or failed
! Transaction Risk - risk arising from problems with service or product
! Compliance Risk - risk arising from violations of laws, rules, or
! Information Security Risk – risk arising from unauthorized access, use,
! Information Security:
vendor’s specific job functions.
! Database Security:
customer-specific information. Database authentication credentials are passed to the database server by the application.
! File Transfer Protocol (FTP)
Unauthorized login attempts are recorded by the system.
FTPs-SSL) when supported and allowed by the customer.
! Internet Encryption
! Internet connections for Hosted applications use Secure Socket Layer (SSL). The
client server used to establish internet connections to the hosted environment has a digital certificate. ! Firewall
! Firewall rules are configured to allow only specific traffic either into the firewall from
the internet or out of the firewall from the vendor. The Hosted applications’ components reside in a Demilitarized Zone (DMZ) which provides a security layer between the internet and the application. ! Intrusion Detection
! Intrusion prevention / detection technology provides an additional layer of security to
protect in-scope network and server infrastructure.
Department Department Head # of Vendors Analyzed # of Vendors Transmitting PII Information Transmitted to / from Vendor ** How [Company name] Secures PII Data To Vendors Secure FTP TLS Encrypted Email TOTAL ** Includes but not limited to: company data, client data, agent / advisor data, employee data
14 DUE DILIGENCE Vendor Research Vendor Evaluation Vendor Selection PROCUREMENT Negotiate contract VENDOR MANAGEMENT Oversight of Existing Vendors
15
! Research viable vendors; ! Determine which vendors to evaluate; ! Select the best vendor based on research and due diligence performed.
Research and analysis that is expected to be performed (and documented) in the examination and evaluation of risks affecting a business transaction.
" Due Diligence Checklist " Due Diligence Questionnaire - Internal " Due Diligence Questionnaire - External
TOOLS ACTIVITIES
16
! Negotiate Contract
" Corporate Procurement Policy " Delegated Authorities TOOLS
ACTIVITY TOOLS ! Oversight of Existing Vendors " Vendor Management Policy
under which the potential business risks of arrangements with third party service providers and suppliers may be assessed, monitored, evaluated and managed.
ACTIVITY
! Lack of resources to dedicate to this function
! Consider relationship managers within different functions
! Centralized vs. Decentralized environment ! Lack of technology integration with third party risk management processes, jeopardizing the accuracy of
! Create an inventory of all vendors
! In a decentralized organization, you may find multiple departments using the same vendor. In those situations – you may be able
to renegotiate your contract for a better price.
! To better manage risk from vendors – rank those third parties according to their level of risk and continue
! Obtain SAS 70 or other control-related reports that the vendor may have in order to obtain an independent
! Establish Key Performance Indicators and require regular / periodic reporting.
! Figure out what matters most to you and right size your program using a vendor
management framework
! Your leadership must buy into the fact that vendor management is a core business discipline
and not a compliance function.
! Vendor management involves multiple stakeholders and subject matter experts from across
the organization.
! You need a central system for storing, managing and reporting on vendor-related
information.
Source: https://www.vendorcentric.com/single-post/10-best- practices-for-vendor-management-programs
! Not all vendors are created equal, and different types of vendor relationships bring different
types of risk.
! Vendor risk assessments and tiering are core components of your vendor management
program.
! Due diligence is where the rubber meets the road in terms of drilling down to really
evaluate risk exposure in your vendor relationships.
! Be sure to align your activities with the risk level of the vendor – more risk
always requires more due diligence.
! Contracts are your only opportunity to legally document the business terms to which
you and your vendor have agreed.
! Your vendor management program should provide for a standard, consistent
contracting process that ensures all of the necessary, risk mitigating contractual clauses are incorporated into the final agreement.
Source: https://www.vendorcentric.com/single-post/10- best-practices-for-vendor-management-programs
! Your vendor management program must address what happens post-contract and who
will be responsible
! Nurture your vendor relationships to get the most value from them.
!
Have a formal process for off-boarding your vendors, especially as it pertains to key contractual requirements such as transfer of assets, data, or destruction of confidential information.
Source: https://www.vendorcentric.com/single-post/10-best- practices-for-vendor-management-programs