Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

TrustArc
TrustArcTrustArc
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Mitigating Third-Party Risks:
Best Practices for CISOs in
Ensuring Robust Security
and Privacy Measures
2
Speakers
Paul Iagnocco
Customer Enablement Lead &
Principal, Data Privacy,
TrustArc
Martin Gomberg
CISSP, CIPP/E
a.k.a. The Privacy CIO
Author CISO Redefined
Agenda
○ Whatʼs the current state of risk management?
○ Who owns third-party risk in the organization?
○ What are we solving for?
○ What are organizational implications around third-party risk?
○ What are the unique implications for Cloud Processing?
○ Questions & Answers
What’s the
current state of
risk management?
5
Privilege is trust, and trust is the cost of doing business.
Our accountability and risk has increased even as our most consequential
data moves out of our control, and a cautious trust is placed in others.
Trust increasingly involves more parties, spans technologies,
spans geographies, changing regulations, and legal jurisdictions.
Our protection is paper, contracts, or TOS check boxes, less technology,
and with less visibility to risks and effectiveness of controls.
We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt
in the system. There are things about our third-party relationships that we simply cannot know.
Who owns
third-party risk in
the organization?
7
Who should own third-party risk management (TPRM)?
• TPRM is a growing strategic priority in most organizations
• TPRM is often decentralized due to size, complexity and budgetary constraints
• There are challenges:
○ Lack of a comprehensive approach
○ Siloed focus on specific risks
○ Insufficient and inefficient for collaboration
○ Missed opportunities
8
Third-party risk touches an organization everywhere
● Executives and line of business management make strategic decisions about aligning, merging,
acquiring, or partnering with other businesses.
● Line of business and procurement managers in acquiring products or services.
● Compliance scrutinizes partners, supply chain and proposed transactions for red flags.
● Legal in the effectiveness and protection of our contracts.
● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent.
● IT in the integration of networks and the movement of data.
● InfoSec in establishing defenses against malicious or unintentional introduction of threats.
● Privacy the movement of data between individuals, entities, and countries and whether the flows of
data conform to local regulations.
Who should own third-party risk management (TPRM)?
9
Stakeholders and Roles
Stakeholders
in Adopting
Third-Party
Relationships
Business
and
Executive
Legal & Human
Resources
Procurement
Operations
& Continuity
Finance
Security
Contracts
Privacy
and Risk
Affiliates &
Partnerships
Service
Procurement
Product
Purchase
Contractors
Merger
Outsourcing
Acquisition
Fraud
Prevention
● Recruitment
● Advisory
● Ops Management
● Security
Prohibited Entities
Entities Under
Sanctions
● Consultants
● Temps
● Vendors
● Brokers
● Suppliers
● Manufacturing
● Sales
● Distribution & Fulfill
● Development
● Strategic
● Infrastructure
● As a service
● Commodity
What are we
solving for?
11
But is there really such a thing as a third-party risk?
● It is third-party risk if it originates from, channels through, or impacts a partner.
● Modern business does not operate in a vacuum. Each component of our value chain in turn
participates with others in a chain of dependencies. There is no risk that is not third-party
risk to someone. There is nothing that we do that does not involve third or n tier parties.
● We are a third-party to someone in our value chain. The same risks that impact us,
and through us threaten other parties, are the same risks that potentially impact our partners,
and through them, threaten us.
● We need to require of them, what we require of us.
INTERNAL ONLY
We and our
network of
partners, theirs, the
technologies we
use, and the
environment in
which we operate
together are a
system, and one
part exposed…
risks others.
… Many companies, even well-known
companies, have not undertaken, completed,
or maintained an inventory and catalog of
the location and classification of the data in
their:
1. environment, or;
2. their material risks.
And therefore have not assessed the value
and sensitivity, or the business
confidentiality, of the data assets they
collect, store or process in house, or are held,
or are serviced on their behalf by
third-parties.
What are
organizational
implications around
third-party risk?
14
When does a third-party risk become core to our risk?
● It is core to our risk if our partners cannot sustain an adequately protected environment.
● If an impact to them disrupts their ability to meet their obligations to us.
● If it impacts them financially shaking our confidence in the relationship.
● If our clients lose trust in us because of the third-party relationship.
● If through accident, carelessness, or malicious acts they are a conduit of attack.
● If our partners violation of compliance with contracts, laws, or duty of care impacts our
clientʼs, their data, or their trust of us.
● In any violation of the law.
15
Due Diligence and Red Flags
Assessing an Organization Assessing a Product or Service
Oversight and accountability Focus, expertise and track record
Leadership and vision Capacity to deliver and commitment to product
Environment and culture Product or service quality and direction
Controls and metrics Planned product support and investment
Policies and practices Staffing, skills & turnover
Technology and infrastructure Technology, Privacy, Operations & Continuity
Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership)
Awareness and education Hardware and software verified and cleared sourcing
Reputation and references Conformance to standards and regulation
Financial Health Cost, and payment terms
Supply Chain Integrity Contract and favorability of terms
16
Business is not static, for us, or for
third-party partners. With business
change, risk moves. Static assessments
are a statement in time. Validity of the
assessment changes because business
is not static, and risk moves. This is true
for our third-party and n-tier partners as
much as it is for ourselves.
Assessment is a reiterative process of
risk classification, address and
review.
Business
Objectives
Material risks
to objectives
Mitigating
Controls
Validation of
Effectiveness
Ongoing Monitoring Internal and Third-Party Risk
17
Regardless of industry, structure, or
relationship, and whether a product,
service, or behavior, and whether
effectiveness is initially assessed
through inquiry, attestation, forms
or checklist, contract, technology,
or onsite audit,
a cadence for periodic review should
be established, the frequency of
sampling or revisitation consistent
with the risk, and with risk tolerance.
Presence of
Controls
Adequacy
of Controls
Frequency
of Use or
Testing
Validation of
Effectiveness
Four Conditions of Effectiveness – Identify, Address, Verify and Prove
18
When entering into a third-party Data Processing Agreement (DPA) for cloud
services, important considerations include:
● Defining engagement specifics
● Ensuring GDPR compliance (Article 28)
● Establishing roles
● Specifying instructions
● Adhering to standards
● Detailing data aspects
● Outlining procedures
● Defining processes for data breach and Data Subject Request support.
● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization
Cloud Processing
Q&A
20
TrustArc TPRM Solutions
trustarc.com/assessment-manager/ trustarc.com/risk-profile/
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Contact Information
Visit http://www.trustarc.com for more
information on how TrustArc can help.
1 von 21

Recomendados

Cybersecurity: How To Protect Your Law Firm Data von
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataRocket Matter, LLC
1.6K views32 Folien
Overcoming Hidden Risks in a Shared Security Model von
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
102 views23 Folien
Data Privacy: The Hidden Beast within Mergers & Acquisitions von
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
138 views24 Folien
Cyber Risk in the Energy Industry von
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryTim Christ Executive Leadership
110 views19 Folien
eCrime-report-2011-accessible von
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
346 views31 Folien
Third-Party Risk Management: How to Identify, Assess & Act von
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActTrustArc
370 views28 Folien

Más contenido relacionado

Similar a Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

Standards in Third Party Risk - DVV Solutions ISACA North May 19 von
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk Management
327 views29 Folien
Tackling the-challenges-of-third-party-risk-management von
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
152 views8 Folien
Data Security, Privacy and Information Governance: Initial Risk Assessment von
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk AssessmentCohenGrigsby
19 views2 Folien
Nymity Framework: Privacy & Data Protection Update in 7 States von
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
237 views22 Folien
How to Manage Vendors and Third Parties to Minimize Privacy Risk von
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
615 views22 Folien
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... von
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
4K views30 Folien

Similar a Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures(20)

Tackling the-challenges-of-third-party-risk-management von Charles Steve
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
Charles Steve152 views
Data Security, Privacy and Information Governance: Initial Risk Assessment von CohenGrigsby
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk Assessment
CohenGrigsby19 views
Nymity Framework: Privacy & Data Protection Update in 7 States von TrustArc
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc237 views
How to Manage Vendors and Third Parties to Minimize Privacy Risk von TrustArc
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc615 views
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... von Giulio Coraggio
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
Giulio Coraggio4K views
Cyber Security Risk Management von Shaun Sloan
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan137 views
Third Party Risk Management von banerjeerohit
Third Party Risk ManagementThird Party Risk Management
Third Party Risk Management
banerjeerohit214 views
The 5 Steps to Managing Third-party Risk von Elizabeth Dimit
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
Elizabeth Dimit56 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von aparnatikekar4
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
aparnatikekar449 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von Nina Yadav
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Nina Yadav77 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von gauravmiishra701
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
gauravmiishra70131 views
Forensic Services and Global Experience:the Intelligent Connection - EY India von karthikswamii
Forensic Services and Global Experience:the Intelligent Connection - EY IndiaForensic Services and Global Experience:the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY India
karthikswamii185 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von SadanandGahivare
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
SadanandGahivare38 views
Evolution of Forensic Data Analytics - EY India von karthikswamii
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
karthikswamii77 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya50 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von sathish kriishnan
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India von NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya66 views
Forensic Services and Global Experience: the Intelligent Connection - EY India von sathish kriishnan
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
sathish kriishnan111 views

Más de TrustArc

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
176 views29 Folien
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security von
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
108 views22 Folien
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... von
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
267 views33 Folien
CBPR - Navigating Cross-Border Data Privacy Compliance von
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
313 views11 Folien
Everything You Need to Know about DPF But Are Afraid to Ask.pdf von
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
1K views12 Folien
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... von
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
272 views32 Folien

Más de TrustArc(20)

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... von TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 views
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security von TrustArc
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc108 views
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... von TrustArc
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc267 views
CBPR - Navigating Cross-Border Data Privacy Compliance von TrustArc
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc313 views
Everything You Need to Know about DPF But Are Afraid to Ask.pdf von TrustArc
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc1K views
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... von TrustArc
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc272 views
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations von TrustArc
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc177 views
Building Trust and Competitive Advantage: The Value of Privacy Certifications von TrustArc
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc219 views
The California Age Appropriate Design Code Act Navigating the New Requirement... von TrustArc
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc51 views
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf von TrustArc
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc152 views
Artificial Intelligence Bill of Rights: Impacts on AI Governance von TrustArc
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc388 views
How To Do Data Transfers Between EU-US in 2023 von TrustArc
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc301 views
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust von TrustArc
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
TrustArc107 views
The Cost of Privacy Teams: What Your Business Needs To Know von TrustArc
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
TrustArc306 views
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf von TrustArc
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc318 views
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy? von TrustArc
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc153 views
Why Your Company Needs A Privacy Culture & Where To Start von TrustArc
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
TrustArc252 views
Data Privacy Perspectives: Get Answers to Your Privacy Questions von TrustArc
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsData Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy Questions
TrustArc133 views
TrustArc Webinar: DPIA Compliance von TrustArc
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
TrustArc177 views
TrustArc Webinar: 2023 Privacy Roadmap von TrustArc
TrustArc Webinar: 2023 Privacy RoadmapTrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy Roadmap
TrustArc146 views

Último

MVP and prioritization.pdf von
MVP and prioritization.pdfMVP and prioritization.pdf
MVP and prioritization.pdfrahuldharwal141
39 views8 Folien
AI + Memoori = AIM von
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIMMemoori
14 views9 Folien
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... von
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Moses Kemibaro
35 views38 Folien
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... von
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...The Digital Insurer
91 views52 Folien
"Package management in monorepos", Zoltan Kochan von
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan KochanFwdays
34 views18 Folien
Business Analyst Series 2023 - Week 4 Session 8 von
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8DianaGray10
145 views13 Folien

Último(20)

AI + Memoori = AIM von Memoori
AI + Memoori = AIMAI + Memoori = AIM
AI + Memoori = AIM
Memoori14 views
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... von Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 views
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... von The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
"Package management in monorepos", Zoltan Kochan von Fwdays
"Package management in monorepos", Zoltan Kochan"Package management in monorepos", Zoltan Kochan
"Package management in monorepos", Zoltan Kochan
Fwdays34 views
Business Analyst Series 2023 - Week 4 Session 8 von DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 views
Transcript: Redefining the book supply chain: A glimpse into the future - Tec... von BookNet Canada
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
Transcript: Redefining the book supply chain: A glimpse into the future - Tec...
BookNet Canada41 views
"Node.js Development in 2024: trends and tools", Nikita Galkin von Fwdays
"Node.js Development in 2024: trends and tools", Nikita Galkin "Node.js Development in 2024: trends and tools", Nikita Galkin
"Node.js Development in 2024: trends and tools", Nikita Galkin
Fwdays33 views
Future of AR - Facebook Presentation von Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty65 views
"Running students' code in isolation. The hard way", Yurii Holiuk von Fwdays
"Running students' code in isolation. The hard way", Yurii Holiuk "Running students' code in isolation. The hard way", Yurii Holiuk
"Running students' code in isolation. The hard way", Yurii Holiuk
Fwdays36 views
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And... von ShapeBlue
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
Enabling DPU Hardware Accelerators in XCP-ng Cloud Platform Environment - And...
ShapeBlue108 views
Deep Tech and the Amplified Organisation: Core Concepts von Holonomics
Deep Tech and the Amplified Organisation: Core ConceptsDeep Tech and the Amplified Organisation: Core Concepts
Deep Tech and the Amplified Organisation: Core Concepts
Holonomics17 views
Innovation & Entrepreneurship strategies in Dairy Industry von PervaizDar1
Innovation & Entrepreneurship strategies in Dairy IndustryInnovation & Entrepreneurship strategies in Dairy Industry
Innovation & Entrepreneurship strategies in Dairy Industry
PervaizDar135 views
Optimizing Communication to Optimize Human Behavior - LCBM von Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 views
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」 von PC Cluster Consortium
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
PCCC23:日本AMD株式会社 テーマ1「AMD Instinct™ アクセラレーターの概要」
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... von ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 views

Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

  • 1. © 2023 TrustArc Inc. Proprietary and Confidential Information. Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures
  • 2. 2 Speakers Paul Iagnocco Customer Enablement Lead & Principal, Data Privacy, TrustArc Martin Gomberg CISSP, CIPP/E a.k.a. The Privacy CIO Author CISO Redefined
  • 3. Agenda ○ Whatʼs the current state of risk management? ○ Who owns third-party risk in the organization? ○ What are we solving for? ○ What are organizational implications around third-party risk? ○ What are the unique implications for Cloud Processing? ○ Questions & Answers
  • 4. What’s the current state of risk management?
  • 5. 5 Privilege is trust, and trust is the cost of doing business. Our accountability and risk has increased even as our most consequential data moves out of our control, and a cautious trust is placed in others. Trust increasingly involves more parties, spans technologies, spans geographies, changing regulations, and legal jurisdictions. Our protection is paper, contracts, or TOS check boxes, less technology, and with less visibility to risks and effectiveness of controls. We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt in the system. There are things about our third-party relationships that we simply cannot know.
  • 6. Who owns third-party risk in the organization?
  • 7. 7 Who should own third-party risk management (TPRM)? • TPRM is a growing strategic priority in most organizations • TPRM is often decentralized due to size, complexity and budgetary constraints • There are challenges: ○ Lack of a comprehensive approach ○ Siloed focus on specific risks ○ Insufficient and inefficient for collaboration ○ Missed opportunities
  • 8. 8 Third-party risk touches an organization everywhere ● Executives and line of business management make strategic decisions about aligning, merging, acquiring, or partnering with other businesses. ● Line of business and procurement managers in acquiring products or services. ● Compliance scrutinizes partners, supply chain and proposed transactions for red flags. ● Legal in the effectiveness and protection of our contracts. ● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent. ● IT in the integration of networks and the movement of data. ● InfoSec in establishing defenses against malicious or unintentional introduction of threats. ● Privacy the movement of data between individuals, entities, and countries and whether the flows of data conform to local regulations. Who should own third-party risk management (TPRM)?
  • 9. 9 Stakeholders and Roles Stakeholders in Adopting Third-Party Relationships Business and Executive Legal & Human Resources Procurement Operations & Continuity Finance Security Contracts Privacy and Risk Affiliates & Partnerships Service Procurement Product Purchase Contractors Merger Outsourcing Acquisition Fraud Prevention ● Recruitment ● Advisory ● Ops Management ● Security Prohibited Entities Entities Under Sanctions ● Consultants ● Temps ● Vendors ● Brokers ● Suppliers ● Manufacturing ● Sales ● Distribution & Fulfill ● Development ● Strategic ● Infrastructure ● As a service ● Commodity
  • 11. 11 But is there really such a thing as a third-party risk? ● It is third-party risk if it originates from, channels through, or impacts a partner. ● Modern business does not operate in a vacuum. Each component of our value chain in turn participates with others in a chain of dependencies. There is no risk that is not third-party risk to someone. There is nothing that we do that does not involve third or n tier parties. ● We are a third-party to someone in our value chain. The same risks that impact us, and through us threaten other parties, are the same risks that potentially impact our partners, and through them, threaten us. ● We need to require of them, what we require of us.
  • 12. INTERNAL ONLY We and our network of partners, theirs, the technologies we use, and the environment in which we operate together are a system, and one part exposed… risks others. … Many companies, even well-known companies, have not undertaken, completed, or maintained an inventory and catalog of the location and classification of the data in their: 1. environment, or; 2. their material risks. And therefore have not assessed the value and sensitivity, or the business confidentiality, of the data assets they collect, store or process in house, or are held, or are serviced on their behalf by third-parties.
  • 14. 14 When does a third-party risk become core to our risk? ● It is core to our risk if our partners cannot sustain an adequately protected environment. ● If an impact to them disrupts their ability to meet their obligations to us. ● If it impacts them financially shaking our confidence in the relationship. ● If our clients lose trust in us because of the third-party relationship. ● If through accident, carelessness, or malicious acts they are a conduit of attack. ● If our partners violation of compliance with contracts, laws, or duty of care impacts our clientʼs, their data, or their trust of us. ● In any violation of the law.
  • 15. 15 Due Diligence and Red Flags Assessing an Organization Assessing a Product or Service Oversight and accountability Focus, expertise and track record Leadership and vision Capacity to deliver and commitment to product Environment and culture Product or service quality and direction Controls and metrics Planned product support and investment Policies and practices Staffing, skills & turnover Technology and infrastructure Technology, Privacy, Operations & Continuity Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership) Awareness and education Hardware and software verified and cleared sourcing Reputation and references Conformance to standards and regulation Financial Health Cost, and payment terms Supply Chain Integrity Contract and favorability of terms
  • 16. 16 Business is not static, for us, or for third-party partners. With business change, risk moves. Static assessments are a statement in time. Validity of the assessment changes because business is not static, and risk moves. This is true for our third-party and n-tier partners as much as it is for ourselves. Assessment is a reiterative process of risk classification, address and review. Business Objectives Material risks to objectives Mitigating Controls Validation of Effectiveness Ongoing Monitoring Internal and Third-Party Risk
  • 17. 17 Regardless of industry, structure, or relationship, and whether a product, service, or behavior, and whether effectiveness is initially assessed through inquiry, attestation, forms or checklist, contract, technology, or onsite audit, a cadence for periodic review should be established, the frequency of sampling or revisitation consistent with the risk, and with risk tolerance. Presence of Controls Adequacy of Controls Frequency of Use or Testing Validation of Effectiveness Four Conditions of Effectiveness – Identify, Address, Verify and Prove
  • 18. 18 When entering into a third-party Data Processing Agreement (DPA) for cloud services, important considerations include: ● Defining engagement specifics ● Ensuring GDPR compliance (Article 28) ● Establishing roles ● Specifying instructions ● Adhering to standards ● Detailing data aspects ● Outlining procedures ● Defining processes for data breach and Data Subject Request support. ● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization Cloud Processing
  • 19. Q&A
  • 21. © 2023 TrustArc Inc. Proprietary and Confidential Information. Contact Information Visit http://www.trustarc.com for more information on how TrustArc can help.