51% of companies have suffered a data breach with an average cost of $3.92 million. Learn how to use TPRM tools to protect your business.
Most CISOs and security teams are well versed in understanding and implementing internal measures to keep their company secure. However, some businesses are a lot more relaxed when it comes to asking the same of their suppliers - but should they be? In 2020 the Ponemon Institute found that 51% of companies have suffered a data breach caused by a third party and that the average cost of a breach was $3.92 million.
So what can you do about it? The good news is that there are plenty of tools that are built to help you ensure that your suppliers are maintaining the security posture, policies, insurances, certifications, audits and operating procedures that you expect of them. The bad news is that it can be hard working out which one is right for your needs.
In this article, we’re going to be discussing the main types of third party risk management/supplier assurance tools, tell you what their strengths are, what their weaknesses are and give some suggested tools that you may want to check out. If you find this article useful, share it with your network.
How do questionnaire tools work: A company curates a list of questions they’d like their suppliers to answer, either bespoke questions designed by them, or by using more ‘off-the-shelf- questionnaires such as the SIG or CAIQ. These are then sent to the 3rd parties via an online form or portal. Once the supplier has completed the questionnaire, it is sent back to the client to review. Often there will be reporting functionality for the client to assign some kind of score, or compare supplier results.
Strengths:
Weaknesses:
Examples: Onetrust, Prevalent, Upguard
Conclusion: If you’re looking for a quick and often cheap way to check your suppliers' security credentials - use a security questionnaire. However, please bare in mind they only provide a point-in-time understanding of a 3rd party’s security and are unable to scale. This can make them less useful to larger organisations. They give good efficiency savings in comparison to manual spreadsheets, but they’re plagued by the same effectiveness problems - they serve mostly to give you a one-off, quick compliance view, not to help you prevent supply chain breaches.
How do vulnerability scanners work: The tools scan the outer perimeter of a supplier’s digital infrastructure, allowing you to understand what systems they are using, services running and potential vulnerabilities. The scanners then check a list of known vulnerabilities related to the aforementioned systems. This information is compiled into a report which can tell an organisation where an attacker might look to exploit an external vulnerability to gain an initial entry foothold.
Strengths:
Weaknesses:
Examples: BitSight, Security Scorecard, Panorays
Conclusion: Scanning tools are a great (although more expensive) plug-in and play tool that allows you to quickly gain a light understanding of an external attacker’s view of your supply chain. It’s worth noting that many of the tools currently available also offer an assessment module, combining the questionnaire tool with a scanner. This shows that a scanner alone is not enough, you should also be checking the internal security posture of an organisation. In addition, the tools can often return false positives, this creates manual effort for the end-user to tidy up the reports into something meaningful. Most dangerously, results from scanning tools can often give a false sense of security - a perfect picture of an organisation that appears to have no issues, when in fact, a simple phishing email could lead to total compromise of their internal systems.
How do shared assurance providers work: The provider gathers and sometimes validates security information provided by suppliers to create a single pool of accurate and up-to-date supplier information.
Strengths:
Weaknesses:
Examples: CyberGRX, Hellios, OneTrust Vendorpedia
Conclusion: Shared assurance providers are good if you don’t want to do the evaluation yourself, however, they have many of the same issues that point in time questionnaires have and are usually more expensive. Their utility is also heavily dependent on the number of suppliers that they have on the platform.
How does Risk Ledger work: Risk Ledger works like a social network, suppliers create a free profile, structured around a standardised framework, they then share this with clients who approve or reject based on their risk appetite. Supplier profiles are being continuously monitored by many clients simultaneously, meaning the information is always under scrutiny, maintaining quality, accuracy and timeliness.
Strengths:
Weaknesses
Conclusion: Risk Ledger is helping organisations work together to improve the security of the global supply chain for consumers and companies alike. The supply chain map growing organically within the platform is a game changer for identifying systemic risk, understanding how threats can spread through the supply chain, and improving response capabilities.
When it comes to Third Party Risk Management (TPRM) and supplier assurance tools, it’s about choosing the right one to fit your needs. Regardless of the tool that you go with, we believe that supply chain security needs to be viewed differently. Whether or not you decide to join us on the Risk Ledger platform we do hope you’ll join us in creating the future of Defend as One. No organisation is an island and we all need to work together to keep the interconnected world a safer place.
If you are interested in learning more about what we do at Risk Ledger, click here.
Third party risk management tools are software solutions designed to help organisations identify and mitigate risks associated with third-party suppliers. These tools are used for managing third-party risk assessments, for monitoring third-party performance, and identifying potential vulnerabilities in the supply chain.
An effective third party risk management tool allows companies to continuously monitoring of their suppliers’ security posture, communicate and collaborate with their suppliers directly on the platform, and provide insights into their wider supply chains, i.e. into fourth, fifth, sixth etc parties, in order to identify possible concentration risks or other risks beyond their immediate suppliers. Risk Ledger enables you to do this all on one platform.
Sign up to our monthly newsletter to receive exclusive research and analyses by our experts, the latest case studies from our clients as well as guides, explainers and more to turn your supply chain risk management programme into a resounding success story.