CYBER BUYER LLC trusted cybersecurity compliance
  • About
  • Services
  • News
  • Contact
  • Become an Advisor
Schedule A Call Download App
  • Assessment Type
    AI Security AssessmentAsset & Expense Management AssessmentBreach Notification Plan AssessmentBusiness Continuity Planning AssessmentCMMCCompliance AssessmentCompliance Data Center Technology Cyber Security CloudCyber Risk AssessmentCyber Security Insurance Readiness AssessmentCyber Security Program Development AssessmentDark Web AssessmentDisaster Recovery Planning AssessmentEmail Threat AssessmentGovernance Program DevelopmentHIPAAHITECHHITRUSTISSO 27001Incident Response Plan AssessmentPenetration Test - PenTestPolicy Review AssessmentMobile Security Assessment
    Smishing Assessment
    Pre Audit Readiness AssessmentPrivacy AssessmentReadiness Assessment - CMMC, SOC, HITRUST, HIPPA, HITECH, ISO 27001Regulatory Compliance Gap Assessment (GDPR, CCPA, CMMC)SaaS Spend AssessmentSEC DisclosureSecurity Impact AssessmentShort Tenure Time WatchSOC 1SOC 2SOC 3SOC for CybersecuritySOC for Vendor Supply ChainThird-Party Risk AssessmentVendor Risk Management Assessment
  • Product Type
    A.I. Detection and ResponseA.I. SecurityAccess ManagementActive Directory Security (AD)Antivirus
    Next-Generation Antivirus (NGAV)
    API SecurityApplication Security (AppSec)Application Security Posture Management (ASPM)Application Detection and Response (ADR)Assessment
    Email Threat AssessmentMicrosoft 365 Security Compliance AssessmentEndpoint Security AssessmentInsider Threat Assessment
    Asset Discovery & ManagementAttack Surface Management (ASM)AuditAwareness TrainingAWS MarketplaceBackupBackup as a Service (BaaS)Bot SecurityBrand ProtectionBreach and Attack Simulation (BAS)CISO as a ServiceCode SecurityCollaboration Security
    Slack SecurityMicrosoft Teams SecurityZoom SecuritySalesforce Chatter SecurityTelegram SecurityWeChat SecurityWhatsApp Security
    Cloud Access Security Broker (CASB)Cloud Security
    AWS Cloud SecurityAzure Cloud SecurityGoogle Cloud Security
    Cloud VPNContinuous Controls Monitoring (CCM)Compliance
    SOC 2
    Continuous Threat Exposure Management (CTEM)Consulting ServicesCyber Asset Attack Surface Management (CAASM)Cyber Risk Quantification (CRQ)Cyber Security InsuranceDark Web MonitoringData Access Governance (DAG)Data Discovery and Classification (DDC)Data Governance SolutionsData Privacy ManagementData Protection
    Data Loss Prevention (DLP)
    Data Security Posture Management (DSPM)DDoS ProtectionDeception TechnologyDigital Executive ProtectionDisaster Recovery as a Service (DRaaS)Email Security
    Cloud Email Security SoftwareDMARC - Domain-Based Message Authentication, Reporting, and ConformanceEmail Anti-Spam SoftwareEmail Encryption SoftwareIntelligent Email Protection SoftwareMicrosoft Office 365 Email SecurityGoogle Workspace Email SecuritySecure Email Gateway Service
    Encryption
    File Encryption
    Endpoint Detection and Response (EDR)Endpoint SecurityExtended Detection and Response (XDR)Governance, Risk and Compliance (GRC)Identity Management
    Non-Human Identity (NHI)Privileged Access Management (PAM)
    Identity and Access Management (IAM)
    Multi-Factor Authentication (MFA)Single Sign-On (SSO)
    Incident Response (IR)
    Digital Forensics and Incident Response (DFIR)
    Insider Risk Detection and ManagementIoT SecurityManaged Detection and Response (MDR)Managed Threat HuntingManaged Security Services Provider (MSSP)
    Penetration Testing Services (PenTest)
    MicrosegmentationMicrosoft Office 365 SecurityMobile Security
    Mobile Threat Defense (MTD)
    Network Detection and Response (NDR)Network Security
    Network Traffic Analysis (NTA)
    Operational Technology Security (OT Security)Password ManagementPasswordless AuthenticationPenetration Testing (PenTest)
    Bug Bounty
    Phishing SecurityPreference and Consent Management SolutionsPrivacy Management SolutionsPrivileged Access Management (PAM)Ransomware ProtectionRisk Management ToolsSaaS Management PlatformSaaS Security (Software as a Service)
    SaaS Security Control Plane (SSCP)
    SaaS Security ComplianceSaaS Security Posture Management (SSPM)SaaS Spend Management PlatformSecure Access Service Edge (SASE)Secure Web Gateway (SWG)Security Information and Event Management (SIEM)Security Orchestration, Automation and Response (SOAR)Security Operations & Threat Intelligence
    Asset ManagementExpense ManagementSIEM
    Security Ratings PlatformSOC as a ServiceSocial Media Security
    Facebook SecurityInstagram SecurityLinkedIn SecurityTwitter Security
    STEALTH MODE Cyber Security Software VendorsThird Party Risk Management - TPRMThreat Intelligence
    Brand IntelligenceCard Fraud IntelligenceContinuous Threat Exposure Management (CTEM)Dark Web Monitoring Threat IntelligenceGeopolitical IntelligenceIdentity IntelligenceOpen Source Intelligence (OSINT)SecOps IntelligenceThird-Party IntelligenceVulnerability Intelligence
    Training
    Cyber RangeHuman Risk Management PlatformSecurity Awareness TrainingTraining Solutions
    Vulnerability Management
    Managed Detection & Response (MDR)
    Web Application Firewall (WAF)Web Browser Security
    Enterprise BrowserSecure Web Browser Extension
    Website Security
    Certificate Lifecycle Management - CLMWebsite Certificate Management
    Zero Trust Network Access (ZTNA)Zero Trust Security Service Edge (Zero Trust SSE)
  • Compliance Category
    Detect
    Security & Continuous Monitoring
    Identify
    Asset ManagementRisk ManagementSecurity & Continuous MonitoringSupply Chain Risk Management
    Protect
    Identity Management & Access ControlProtective TechnologyAwareness & Training
    Respond
    AnalysisMitigation
  • Compliance Standard
    CMMCISO 27001SOC 1SOC 2SOC 3HIPAAHITECHHITRUSTNIST
  • Home
  • Media
  • Security 360o Perspective Addressing Third Party Risk
News & Media

Security 360o Perspective: Addressing Third Party Risk

December 20th 2024

Competing in an age of AI and rapid innovation requires organizations to think globally, act quickly, and exponentially increase reliance on an ecosystem of third parties. While organizations can delegate their responsibilities to third-party suppliers, the ownership of the risk remains. An organization must have internal controls over the selection and oversight of third parties and share third-party risk to stakeholders. Assessing third parties has become a non-trivial exercise with the advent of artificial intelligence and use of other transformational technologies.

While third parties have adopted IT transformation, many have taken their eyes off TPRM. According to Forrester, survey respondents ranked third party risk at 18th in enterprise risk at 8%, down from 20% in just a year. [i] North America and Asia Pacific are spearheading this trend, while Europe only dropped 7%. It is neither time to relax nor get stressed out. A simple course correction will do!

Within the Cybersecurity Ecosystem[ii], the Governance, Risk, and Compliance area includes Third-Party Risk Management (TPRM). TPRM manages external entities like vendors, suppliers, and partners that an organization engages with. Within the NIST Cybersecurity Framework (CSF), Supply Chain Risk Management (ID.SC) calls for a five-step process.

  1. Owner is assigned and process is defined to manage TPRM program. [iii]
  2. Inclusion of applicable suppliers and third-party partners in the program.[iv]
  3. Establishment of contracts with providers to meet organizational objectives.[v]
  4. Routinely testing providers to assess contractual obligations and identify risks.[vi]
  5. Testing response and recovery planning with providers.[vii]

The implicit risk of a third-party is the impact that might result if the third party lacked controls protecting the confidentiality, integrity, and availability (CIA) of the information assets depended upon. TPRM due diligence must vary to the degree of implicit risk in the relationship. The TPRM process in step 1 must establish the criteria for inclusion and the standard for due care.

A few control frameworks exist which clarify supplier controls and evidence criteria. One of the oldest and widely used frameworks is BITS Shared Assessments.[viii] More recently, NIST has published guidance on Cybersecurity Supply Chain Risk Management (C-SCRM).[ix] Note that SCRM covers the entire supply chain – our focus here is the TPRM subset.

Adoption should consider the providers already under contract and new providers being considered. Contracts typically have a term which caps the risk in existing contracts and enables inclusion of the provider into the new process later.

Step 1 must create contract templates preferably aligned to asset value. Step 3 utilizes the template to establish acceptable provider specific contracts. Contract negotiations may remove desired contract clauses. The risks of these changes must be well understood by negotiators.

Many organizations outsource TPRM due to the volume of providers being used and the security skills needed to perform assessments. TPRM is a people-centric process using tools to track the workflow and collect evidence and outcomes. Look for tools supporting Governance, Risk, and Compliance (GRC) within the Cybersecurity Ecosystem. Cyber Buyer has several partners in this space.[x]

---------------------------------

Donald Borsay is an advisor, auditor, and instructor, with over 20 years dedicated to Cybersecurity. Borsay is a thought leader and Security Advisor for Coyote Brown, supporting Cybersecurity program initiation, assessment, and fractional CISO managed services. Borsay has developed TPRM programs and provided TPRM assessments for several organizations. Feedback is welcome at: Donald.borsay@cyberbuyer.io.

Coyote Brown offers Cybersecurity Advisory, Consulting, and Assessment Services, composed of highly experienced strategic cybersecurity advisors and consultants helping clients maintain a healthy cyber security posture.

Tech City Advisors is an IT Service Provider with specialized knowledge of information technology. They have commercial partnerships with over 300 technology vendors, enabling the resale and support to clients on behalf of our vendor partners.

[i] Forrester’s The State Of Enterprise Risk Management, 2023 - https://www.forrester.com/report/the-state-of-enterprise-risk-management-2023/RES179759

[ii] Strategy of Security, The Ecosystem Explained - https://strategyofsecurity.com/cybersecurity-ecosystem/

[iii] CSF Tools – ID.SC-1 - https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/id-sc-1/

[iv] CSF Tools – ID.SC-2 - https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/id-sc-2/

[v] CSF Tools – ID.SC-3 - https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/id-sc-3/

[vi] CSF Tools – ID.SC-4 - https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/id-sc-4/

[vii] CSF Tools – ID.SC-5 - https://csf.tools/reference/nist-cybersecurity-framework/v1-1/id/id-sc/id-sc-5/

[viii] Shared Assessments About - https://sharedassessments.org/about-us/

[ix] NIST Cybersecurity Supply Chain Risk Management C-SCRM - https://csrc.nist.gov/projects/cyber-supply-chain-risk-management#:~:text=This%20ecosystem%20is%20composed%20of,and%20its%20products%20and%20services.

[x] Cyber Buyer GRC Partners - https://www.cyberbuyer.com/suppliers-category/product-type/governance-risk-and-compliance-grc




« Back to News & Media
Newsletter Sign Up

CYBER BUYER LLC trusted cybersecurity compliance
  • 7761 Ballantyne Commons Parkway, Suite 102, Charlotte, NC 28277
  • 980.729.6328
Browse By
  • Product Type
  • Compliance Category
  • Compliance Standard
Company
  • About Us
  • Our Advisors
  • Our Services
  • News & Media
  • Download Our App on Apple App Store
  • Download Our App on Google Play
  • The Cyber Breakfast Club®
Support
  • Contact Us
  • Newsletter Sign-up
  • Privacy & Terms
  • Sitemap
© 2025 CYBER BUYER ® LLC. All Rights Reserved.
CYBER BUYER LLC trusted cybersecurity compliance
Assessment Type
AI Security AssessmentAsset & Expense Management AssessmentBreach Notification Plan AssessmentBusiness Continuity Planning AssessmentCMMCCompliance AssessmentCompliance Data Center Technology Cyber Security CloudCyber Risk AssessmentCyber Security Insurance Readiness AssessmentCyber Security Program Development AssessmentDark Web AssessmentDisaster Recovery Planning AssessmentEmail Threat AssessmentGovernance Program DevelopmentHIPAAHITECHHITRUSTISSO 27001Incident Response Plan AssessmentPenetration Test - PenTestPolicy Review AssessmentMobile Security Assessment
Smishing Assessment
Pre Audit Readiness AssessmentPrivacy AssessmentReadiness Assessment - CMMC, SOC, HITRUST, HIPPA, HITECH, ISO 27001Regulatory Compliance Gap Assessment (GDPR, CCPA, CMMC)SaaS Spend AssessmentSEC DisclosureSecurity Impact AssessmentShort Tenure Time WatchSOC 1SOC 2SOC 3SOC for CybersecuritySOC for Vendor Supply ChainThird-Party Risk AssessmentVendor Risk Management Assessment
Product Type
A.I. Detection and ResponseA.I. SecurityAccess ManagementActive Directory Security (AD)Antivirus
Next-Generation Antivirus (NGAV)
API SecurityApplication Security (AppSec)Application Security Posture Management (ASPM)Application Detection and Response (ADR)Assessment
Email Threat AssessmentMicrosoft 365 Security Compliance AssessmentEndpoint Security AssessmentInsider Threat Assessment
Asset Discovery & ManagementAttack Surface Management (ASM)AuditAwareness TrainingAWS MarketplaceBackupBackup as a Service (BaaS)Bot SecurityBrand ProtectionBreach and Attack Simulation (BAS)CISO as a ServiceCode SecurityCollaboration Security
Slack SecurityMicrosoft Teams SecurityZoom SecuritySalesforce Chatter SecurityTelegram SecurityWeChat SecurityWhatsApp Security
Cloud Access Security Broker (CASB)Cloud Security
AWS Cloud SecurityAzure Cloud SecurityGoogle Cloud Security
Cloud VPNContinuous Controls Monitoring (CCM)Compliance
SOC 2
Continuous Threat Exposure Management (CTEM)Consulting ServicesCyber Asset Attack Surface Management (CAASM)Cyber Risk Quantification (CRQ)Cyber Security InsuranceDark Web MonitoringData Access Governance (DAG)Data Discovery and Classification (DDC)Data Governance SolutionsData Privacy ManagementData Protection
Data Loss Prevention (DLP)
Data Security Posture Management (DSPM)DDoS ProtectionDeception TechnologyDigital Executive ProtectionDisaster Recovery as a Service (DRaaS)Email Security
Cloud Email Security SoftwareDMARC - Domain-Based Message Authentication, Reporting, and ConformanceEmail Anti-Spam SoftwareEmail Encryption SoftwareIntelligent Email Protection SoftwareMicrosoft Office 365 Email SecurityGoogle Workspace Email SecuritySecure Email Gateway Service
Encryption
File Encryption
Endpoint Detection and Response (EDR)Endpoint SecurityExtended Detection and Response (XDR)Governance, Risk and Compliance (GRC)Identity Management
Non-Human Identity (NHI)Privileged Access Management (PAM)
Identity and Access Management (IAM)
Multi-Factor Authentication (MFA)Single Sign-On (SSO)
Incident Response (IR)
Digital Forensics and Incident Response (DFIR)
Insider Risk Detection and ManagementIoT SecurityManaged Detection and Response (MDR)Managed Threat HuntingManaged Security Services Provider (MSSP)
Penetration Testing Services (PenTest)
MicrosegmentationMicrosoft Office 365 SecurityMobile Security
Mobile Threat Defense (MTD)
Network Detection and Response (NDR)Network Security
Network Traffic Analysis (NTA)
Operational Technology Security (OT Security)Password ManagementPasswordless AuthenticationPenetration Testing (PenTest)
Bug Bounty
Phishing SecurityPreference and Consent Management SolutionsPrivacy Management SolutionsPrivileged Access Management (PAM)Ransomware ProtectionRisk Management ToolsSaaS Management PlatformSaaS Security (Software as a Service)
SaaS Security Control Plane (SSCP)
SaaS Security ComplianceSaaS Security Posture Management (SSPM)SaaS Spend Management PlatformSecure Access Service Edge (SASE)Secure Web Gateway (SWG)Security Information and Event Management (SIEM)Security Orchestration, Automation and Response (SOAR)Security Operations & Threat Intelligence
Asset ManagementExpense ManagementSIEM
Security Ratings PlatformSOC as a ServiceSocial Media Security
Facebook SecurityInstagram SecurityLinkedIn SecurityTwitter Security
STEALTH MODE Cyber Security Software VendorsThird Party Risk Management - TPRMThreat Intelligence
Brand IntelligenceCard Fraud IntelligenceContinuous Threat Exposure Management (CTEM)Dark Web Monitoring Threat IntelligenceGeopolitical IntelligenceIdentity IntelligenceOpen Source Intelligence (OSINT)SecOps IntelligenceThird-Party IntelligenceVulnerability Intelligence
Training
Cyber RangeHuman Risk Management PlatformSecurity Awareness TrainingTraining Solutions
Vulnerability Management
Managed Detection & Response (MDR)
Web Application Firewall (WAF)Web Browser Security
Enterprise BrowserSecure Web Browser Extension
Website Security
Certificate Lifecycle Management - CLMWebsite Certificate Management
Zero Trust Network Access (ZTNA)Zero Trust Security Service Edge (Zero Trust SSE)
Compliance Category
Detect
Security & Continuous Monitoring
Identify
Asset ManagementRisk ManagementSecurity & Continuous MonitoringSupply Chain Risk Management
Protect
Identity Management & Access ControlProtective TechnologyAwareness & Training
Respond
AnalysisMitigation
Compliance Standard
CMMCISO 27001SOC 1SOC 2SOC 3HIPAAHITECHHITRUSTNIST