Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

TrustArc
TrustArcTrustArc
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Mitigating Third-Party Risks:
Best Practices for CISOs in
Ensuring Robust Security
and Privacy Measures
2
Speakers
Paul Iagnocco
Customer Enablement Lead &
Principal, Data Privacy,
TrustArc
Martin Gomberg
CISSP, CIPP/E
a.k.a. The Privacy CIO
Author CISO Redefined
Agenda
○ Whatʼs the current state of risk management?
○ Who owns third-party risk in the organization?
○ What are we solving for?
○ What are organizational implications around third-party risk?
○ What are the unique implications for Cloud Processing?
○ Questions & Answers
What’s the
current state of
risk management?
5
Privilege is trust, and trust is the cost of doing business.
Our accountability and risk has increased even as our most consequential
data moves out of our control, and a cautious trust is placed in others.
Trust increasingly involves more parties, spans technologies,
spans geographies, changing regulations, and legal jurisdictions.
Our protection is paper, contracts, or TOS check boxes, less technology,
and with less visibility to risks and effectiveness of controls.
We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt
in the system. There are things about our third-party relationships that we simply cannot know.
Who owns
third-party risk in
the organization?
7
Who should own third-party risk management (TPRM)?
• TPRM is a growing strategic priority in most organizations
• TPRM is often decentralized due to size, complexity and budgetary constraints
• There are challenges:
○ Lack of a comprehensive approach
○ Siloed focus on specific risks
○ Insufficient and inefficient for collaboration
○ Missed opportunities
8
Third-party risk touches an organization everywhere
● Executives and line of business management make strategic decisions about aligning, merging,
acquiring, or partnering with other businesses.
● Line of business and procurement managers in acquiring products or services.
● Compliance scrutinizes partners, supply chain and proposed transactions for red flags.
● Legal in the effectiveness and protection of our contracts.
● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent.
● IT in the integration of networks and the movement of data.
● InfoSec in establishing defenses against malicious or unintentional introduction of threats.
● Privacy the movement of data between individuals, entities, and countries and whether the flows of
data conform to local regulations.
Who should own third-party risk management (TPRM)?
9
Stakeholders and Roles
Stakeholders
in Adopting
Third-Party
Relationships
Business
and
Executive
Legal & Human
Resources
Procurement
Operations
& Continuity
Finance
Security
Contracts
Privacy
and Risk
Affiliates &
Partnerships
Service
Procurement
Product
Purchase
Contractors
Merger
Outsourcing
Acquisition
Fraud
Prevention
● Recruitment
● Advisory
● Ops Management
● Security
Prohibited Entities
Entities Under
Sanctions
● Consultants
● Temps
● Vendors
● Brokers
● Suppliers
● Manufacturing
● Sales
● Distribution & Fulfill
● Development
● Strategic
● Infrastructure
● As a service
● Commodity
What are we
solving for?
11
But is there really such a thing as a third-party risk?
● It is third-party risk if it originates from, channels through, or impacts a partner.
● Modern business does not operate in a vacuum. Each component of our value chain in turn
participates with others in a chain of dependencies. There is no risk that is not third-party
risk to someone. There is nothing that we do that does not involve third or n tier parties.
● We are a third-party to someone in our value chain. The same risks that impact us,
and through us threaten other parties, are the same risks that potentially impact our partners,
and through them, threaten us.
● We need to require of them, what we require of us.
INTERNAL ONLY
We and our
network of
partners, theirs, the
technologies we
use, and the
environment in
which we operate
together are a
system, and one
part exposed…
risks others.
… Many companies, even well-known
companies, have not undertaken, completed,
or maintained an inventory and catalog of
the location and classification of the data in
their:
1. environment, or;
2. their material risks.
And therefore have not assessed the value
and sensitivity, or the business
confidentiality, of the data assets they
collect, store or process in house, or are held,
or are serviced on their behalf by
third-parties.
What are
organizational
implications around
third-party risk?
14
When does a third-party risk become core to our risk?
● It is core to our risk if our partners cannot sustain an adequately protected environment.
● If an impact to them disrupts their ability to meet their obligations to us.
● If it impacts them financially shaking our confidence in the relationship.
● If our clients lose trust in us because of the third-party relationship.
● If through accident, carelessness, or malicious acts they are a conduit of attack.
● If our partners violation of compliance with contracts, laws, or duty of care impacts our
clientʼs, their data, or their trust of us.
● In any violation of the law.
15
Due Diligence and Red Flags
Assessing an Organization Assessing a Product or Service
Oversight and accountability Focus, expertise and track record
Leadership and vision Capacity to deliver and commitment to product
Environment and culture Product or service quality and direction
Controls and metrics Planned product support and investment
Policies and practices Staffing, skills & turnover
Technology and infrastructure Technology, Privacy, Operations & Continuity
Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership)
Awareness and education Hardware and software verified and cleared sourcing
Reputation and references Conformance to standards and regulation
Financial Health Cost, and payment terms
Supply Chain Integrity Contract and favorability of terms
16
Business is not static, for us, or for
third-party partners. With business
change, risk moves. Static assessments
are a statement in time. Validity of the
assessment changes because business
is not static, and risk moves. This is true
for our third-party and n-tier partners as
much as it is for ourselves.
Assessment is a reiterative process of
risk classification, address and
review.
Business
Objectives
Material risks
to objectives
Mitigating
Controls
Validation of
Effectiveness
Ongoing Monitoring Internal and Third-Party Risk
17
Regardless of industry, structure, or
relationship, and whether a product,
service, or behavior, and whether
effectiveness is initially assessed
through inquiry, attestation, forms
or checklist, contract, technology,
or onsite audit,
a cadence for periodic review should
be established, the frequency of
sampling or revisitation consistent
with the risk, and with risk tolerance.
Presence of
Controls
Adequacy
of Controls
Frequency
of Use or
Testing
Validation of
Effectiveness
Four Conditions of Effectiveness – Identify, Address, Verify and Prove
18
When entering into a third-party Data Processing Agreement (DPA) for cloud
services, important considerations include:
● Defining engagement specifics
● Ensuring GDPR compliance (Article 28)
● Establishing roles
● Specifying instructions
● Adhering to standards
● Detailing data aspects
● Outlining procedures
● Defining processes for data breach and Data Subject Request support.
● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization
Cloud Processing
Q&A
20
TrustArc TPRM Solutions
trustarc.com/assessment-manager/ trustarc.com/risk-profile/
© 2023 TrustArc Inc. Proprietary and Confidential Information.
Contact Information
Visit http://www.trustarc.com for more
information on how TrustArc can help.
1 sur 21

Recommandé

Cybersecurity: How To Protect Your Law Firm Data par
Cybersecurity: How To Protect Your Law Firm DataCybersecurity: How To Protect Your Law Firm Data
Cybersecurity: How To Protect Your Law Firm DataRocket Matter, LLC
1.6K vues32 diapositives
Overcoming Hidden Risks in a Shared Security Model par
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
102 vues23 diapositives
Data Privacy: The Hidden Beast within Mergers & Acquisitions par
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
138 vues24 diapositives
Cyber Risk in the Energy Industry par
Cyber Risk in the Energy IndustryCyber Risk in the Energy Industry
Cyber Risk in the Energy IndustryTim Christ Executive Leadership
110 vues19 diapositives
eCrime-report-2011-accessible par
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
346 vues31 diapositives
Third-Party Risk Management: How to Identify, Assess & Act par
Third-Party Risk Management: How to Identify, Assess & ActThird-Party Risk Management: How to Identify, Assess & Act
Third-Party Risk Management: How to Identify, Assess & ActTrustArc
370 vues28 diapositives

Contenu connexe

Similaire à Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

Standards in Third Party Risk - DVV Solutions ISACA North May 19 par
Standards in Third Party Risk - DVV Solutions ISACA North May 19 Standards in Third Party Risk - DVV Solutions ISACA North May 19
Standards in Third Party Risk - DVV Solutions ISACA North May 19 DVV Solutions Third Party Risk Management
327 vues29 diapositives
Tackling the-challenges-of-third-party-risk-management par
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
152 vues8 diapositives
Data Security, Privacy and Information Governance: Initial Risk Assessment par
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk AssessmentCohenGrigsby
19 vues2 diapositives
Nymity Framework: Privacy & Data Protection Update in 7 States par
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
237 vues22 diapositives
How to Manage Vendors and Third Parties to Minimize Privacy Risk par
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy RiskTrustArc
615 vues22 diapositives
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... par
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...Giulio Coraggio
4K vues30 diapositives

Similaire à Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures(20)

Tackling the-challenges-of-third-party-risk-management par Charles Steve
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
Charles Steve152 vues
Data Security, Privacy and Information Governance: Initial Risk Assessment par CohenGrigsby
Data Security, Privacy and Information Governance: Initial Risk AssessmentData Security, Privacy and Information Governance: Initial Risk Assessment
Data Security, Privacy and Information Governance: Initial Risk Assessment
CohenGrigsby19 vues
Nymity Framework: Privacy & Data Protection Update in 7 States par TrustArc
Nymity Framework: Privacy & Data Protection Update in 7 StatesNymity Framework: Privacy & Data Protection Update in 7 States
Nymity Framework: Privacy & Data Protection Update in 7 States
TrustArc237 vues
How to Manage Vendors and Third Parties to Minimize Privacy Risk par TrustArc
How to Manage Vendors and Third Parties to Minimize Privacy RiskHow to Manage Vendors and Third Parties to Minimize Privacy Risk
How to Manage Vendors and Third Parties to Minimize Privacy Risk
TrustArc615 vues
#Privacy Matters - Come il regolamento privacy europeo da un problema può div... par Giulio Coraggio
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
#Privacy Matters - Come il regolamento privacy europeo da un problema può div...
Giulio Coraggio4K vues
Cyber Security Risk Management par Shaun Sloan
Cyber Security Risk ManagementCyber Security Risk Management
Cyber Security Risk Management
Shaun Sloan137 vues
The 5 Steps to Managing Third-party Risk par Elizabeth Dimit
The 5 Steps to Managing Third-party RiskThe 5 Steps to Managing Third-party Risk
The 5 Steps to Managing Third-party Risk
Elizabeth Dimit56 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par aparnatikekar4
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
aparnatikekar449 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par Nina Yadav
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Nina Yadav77 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par gauravmiishra701
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY India par karthikswamii
Forensic Services and Global Experience:the Intelligent Connection - EY IndiaForensic Services and Global Experience:the Intelligent Connection - EY India
Forensic Services and Global Experience:the Intelligent Connection - EY India
karthikswamii185 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par SadanandGahivare
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Evolution of Forensic Data Analytics - EY India par karthikswamii
Evolution of Forensic Data Analytics - EY IndiaEvolution of Forensic Data Analytics - EY India
Evolution of Forensic Data Analytics - EY India
karthikswamii77 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya50 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par sathish kriishnan
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India par NishantSisodiya
Forensic Services and Global Experience: the Intelligent Connection - EY IndiaForensic Services and Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India
NishantSisodiya66 vues
Forensic Services and Global Experience: the Intelligent Connection - EY India par sathish kriishnan
Forensic Services and  Global Experience: the Intelligent Connection - EY IndiaForensic Services and  Global Experience: the Intelligent Connection - EY India
Forensic Services and Global Experience: the Intelligent Connection - EY India

Plus de TrustArc

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... par
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc
176 vues29 diapositives
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security par
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
108 vues22 diapositives
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... par
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
267 vues33 diapositives
CBPR - Navigating Cross-Border Data Privacy Compliance par
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
313 vues11 diapositives
Everything You Need to Know about DPF But Are Afraid to Ask.pdf par
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
1K vues12 diapositives
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... par
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
272 vues32 diapositives

Plus de TrustArc(20)

TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... par TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc176 vues
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security par TrustArc
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data Security
TrustArc108 vues
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass... par TrustArc
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...
TrustArc267 vues
CBPR - Navigating Cross-Border Data Privacy Compliance par TrustArc
CBPR - Navigating Cross-Border Data Privacy ComplianceCBPR - Navigating Cross-Border Data Privacy Compliance
CBPR - Navigating Cross-Border Data Privacy Compliance
TrustArc313 vues
Everything You Need to Know about DPF But Are Afraid to Ask.pdf par TrustArc
Everything You Need to Know about DPF But Are Afraid to Ask.pdfEverything You Need to Know about DPF But Are Afraid to Ask.pdf
Everything You Need to Know about DPF But Are Afraid to Ask.pdf
TrustArc1K vues
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C... par TrustArc
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...
TrustArc272 vues
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations par TrustArc
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsPrivacy Enhancing Technologies: Exploring the Benefits and Recommendations
Privacy Enhancing Technologies: Exploring the Benefits and Recommendations
TrustArc177 vues
Building Trust and Competitive Advantage: The Value of Privacy Certifications par TrustArc
Building Trust and Competitive Advantage: The Value of Privacy CertificationsBuilding Trust and Competitive Advantage: The Value of Privacy Certifications
Building Trust and Competitive Advantage: The Value of Privacy Certifications
TrustArc219 vues
The California Age Appropriate Design Code Act Navigating the New Requirement... par TrustArc
The California Age Appropriate Design Code Act Navigating the New Requirement...The California Age Appropriate Design Code Act Navigating the New Requirement...
The California Age Appropriate Design Code Act Navigating the New Requirement...
TrustArc51 vues
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf par TrustArc
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdf
TrustArc152 vues
Artificial Intelligence Bill of Rights: Impacts on AI Governance par TrustArc
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceArtificial Intelligence Bill of Rights: Impacts on AI Governance
Artificial Intelligence Bill of Rights: Impacts on AI Governance
TrustArc388 vues
How To Do Data Transfers Between EU-US in 2023 par TrustArc
How To Do Data Transfers Between EU-US in 2023How To Do Data Transfers Between EU-US in 2023
How To Do Data Transfers Between EU-US in 2023
TrustArc301 vues
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust par TrustArc
The Ultimate Balancing Act:  Using Consumer Data and Maintaining TrustThe Ultimate Balancing Act:  Using Consumer Data and Maintaining Trust
The Ultimate Balancing Act: Using Consumer Data and Maintaining Trust
TrustArc107 vues
The Cost of Privacy Teams: What Your Business Needs To Know par TrustArc
The Cost of Privacy Teams: What Your Business Needs To KnowThe Cost of Privacy Teams: What Your Business Needs To Know
The Cost of Privacy Teams: What Your Business Needs To Know
TrustArc306 vues
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf par TrustArc
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdfTrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc Webinar_ How Data Privacy Demands Impact Your Marketing Team.pdf
TrustArc318 vues
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy? par TrustArc
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc Webinar - Rise of Information Technology: How Does it Impact Privacy?
TrustArc153 vues
Why Your Company Needs A Privacy Culture & Where To Start par TrustArc
Why Your Company Needs A Privacy Culture & Where To StartWhy Your Company Needs A Privacy Culture & Where To Start
Why Your Company Needs A Privacy Culture & Where To Start
TrustArc252 vues
Data Privacy Perspectives: Get Answers to Your Privacy Questions par TrustArc
Data Privacy Perspectives: Get Answers to Your Privacy QuestionsData Privacy Perspectives: Get Answers to Your Privacy Questions
Data Privacy Perspectives: Get Answers to Your Privacy Questions
TrustArc133 vues
TrustArc Webinar: DPIA Compliance par TrustArc
TrustArc Webinar: DPIA ComplianceTrustArc Webinar: DPIA Compliance
TrustArc Webinar: DPIA Compliance
TrustArc177 vues
TrustArc Webinar: 2023 Privacy Roadmap par TrustArc
TrustArc Webinar: 2023 Privacy RoadmapTrustArc Webinar: 2023 Privacy Roadmap
TrustArc Webinar: 2023 Privacy Roadmap
TrustArc146 vues

Dernier

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue par
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueShapeBlue
265 vues23 diapositives
The Power of Generative AI in Accelerating No Code Adoption.pdf par
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdfSaeed Al Dhaheri
39 vues18 diapositives
Cencora Executive Symposium par
Cencora Executive SymposiumCencora Executive Symposium
Cencora Executive Symposiummarketingcommunicati21
160 vues14 diapositives
Generative AI: Shifting the AI Landscape par
Generative AI: Shifting the AI LandscapeGenerative AI: Shifting the AI Landscape
Generative AI: Shifting the AI LandscapeDeakin University
67 vues55 diapositives
Future of AR - Facebook Presentation par
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook PresentationRob McCarty
65 vues27 diapositives
The Role of Patterns in the Era of Large Language Models par
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language ModelsYunyao Li
91 vues65 diapositives

Dernier(20)

What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue par ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlueWhat’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
What’s New in CloudStack 4.19 - Abhishek Kumar - ShapeBlue
ShapeBlue265 vues
The Power of Generative AI in Accelerating No Code Adoption.pdf par Saeed Al Dhaheri
The Power of Generative AI in Accelerating No Code Adoption.pdfThe Power of Generative AI in Accelerating No Code Adoption.pdf
The Power of Generative AI in Accelerating No Code Adoption.pdf
Future of AR - Facebook Presentation par Rob McCarty
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
Rob McCarty65 vues
The Role of Patterns in the Era of Large Language Models par Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li91 vues
NTGapps NTG LowCode Platform par Mustafa Kuğu
NTGapps NTG LowCode Platform NTGapps NTG LowCode Platform
NTGapps NTG LowCode Platform
Mustafa Kuğu437 vues
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... par ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue162 vues
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De... par Moses Kemibaro
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Don’t Make A Human Do A Robot’s Job! : 6 Reasons Why AI Will Save Us & Not De...
Moses Kemibaro35 vues
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ... par ShapeBlue
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
Import Export Virtual Machine for KVM Hypervisor - Ayush Pandey - University ...
ShapeBlue120 vues
Initiating and Advancing Your Strategic GIS Governance Strategy par Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software184 vues
Business Analyst Series 2023 - Week 4 Session 8 par DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray10145 vues
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading... par The Digital Insurer
Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...Webinar : Desperately Seeking Transformation - Part 2:  Insights from leading...
Webinar : Desperately Seeking Transformation - Part 2: Insights from leading...
The Power of Heat Decarbonisation Plans in the Built Environment par IES VE
The Power of Heat Decarbonisation Plans in the Built EnvironmentThe Power of Heat Decarbonisation Plans in the Built Environment
The Power of Heat Decarbonisation Plans in the Built Environment
IES VE84 vues
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue par ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue224 vues
Digital Personal Data Protection (DPDP) Practical Approach For CISOs par Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash162 vues
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda... par ShapeBlue
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
Hypervisor Agnostic DRS in CloudStack - Brief overview & demo - Vishesh Jinda...
ShapeBlue164 vues
Optimizing Communication to Optimize Human Behavior - LCBM par Yaman Kumar
Optimizing Communication to Optimize Human Behavior - LCBMOptimizing Communication to Optimize Human Behavior - LCBM
Optimizing Communication to Optimize Human Behavior - LCBM
Yaman Kumar38 vues
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... par ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue199 vues

Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures

  • 1. © 2023 TrustArc Inc. Proprietary and Confidential Information. Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Security and Privacy Measures
  • 2. 2 Speakers Paul Iagnocco Customer Enablement Lead & Principal, Data Privacy, TrustArc Martin Gomberg CISSP, CIPP/E a.k.a. The Privacy CIO Author CISO Redefined
  • 3. Agenda ○ Whatʼs the current state of risk management? ○ Who owns third-party risk in the organization? ○ What are we solving for? ○ What are organizational implications around third-party risk? ○ What are the unique implications for Cloud Processing? ○ Questions & Answers
  • 4. What’s the current state of risk management?
  • 5. 5 Privilege is trust, and trust is the cost of doing business. Our accountability and risk has increased even as our most consequential data moves out of our control, and a cautious trust is placed in others. Trust increasingly involves more parties, spans technologies, spans geographies, changing regulations, and legal jurisdictions. Our protection is paper, contracts, or TOS check boxes, less technology, and with less visibility to risks and effectiveness of controls. We build indemnification in contracts as an insurance, but it is an acknowledgement of the dirt in the system. There are things about our third-party relationships that we simply cannot know.
  • 6. Who owns third-party risk in the organization?
  • 7. 7 Who should own third-party risk management (TPRM)? • TPRM is a growing strategic priority in most organizations • TPRM is often decentralized due to size, complexity and budgetary constraints • There are challenges: ○ Lack of a comprehensive approach ○ Siloed focus on specific risks ○ Insufficient and inefficient for collaboration ○ Missed opportunities
  • 8. 8 Third-party risk touches an organization everywhere ● Executives and line of business management make strategic decisions about aligning, merging, acquiring, or partnering with other businesses. ● Line of business and procurement managers in acquiring products or services. ● Compliance scrutinizes partners, supply chain and proposed transactions for red flags. ● Legal in the effectiveness and protection of our contracts. ● Finance and HR on the cost and people aspects of acquiring, relocating, and integrating talent. ● IT in the integration of networks and the movement of data. ● InfoSec in establishing defenses against malicious or unintentional introduction of threats. ● Privacy the movement of data between individuals, entities, and countries and whether the flows of data conform to local regulations. Who should own third-party risk management (TPRM)?
  • 9. 9 Stakeholders and Roles Stakeholders in Adopting Third-Party Relationships Business and Executive Legal & Human Resources Procurement Operations & Continuity Finance Security Contracts Privacy and Risk Affiliates & Partnerships Service Procurement Product Purchase Contractors Merger Outsourcing Acquisition Fraud Prevention ● Recruitment ● Advisory ● Ops Management ● Security Prohibited Entities Entities Under Sanctions ● Consultants ● Temps ● Vendors ● Brokers ● Suppliers ● Manufacturing ● Sales ● Distribution & Fulfill ● Development ● Strategic ● Infrastructure ● As a service ● Commodity
  • 11. 11 But is there really such a thing as a third-party risk? ● It is third-party risk if it originates from, channels through, or impacts a partner. ● Modern business does not operate in a vacuum. Each component of our value chain in turn participates with others in a chain of dependencies. There is no risk that is not third-party risk to someone. There is nothing that we do that does not involve third or n tier parties. ● We are a third-party to someone in our value chain. The same risks that impact us, and through us threaten other parties, are the same risks that potentially impact our partners, and through them, threaten us. ● We need to require of them, what we require of us.
  • 12. INTERNAL ONLY We and our network of partners, theirs, the technologies we use, and the environment in which we operate together are a system, and one part exposed… risks others. … Many companies, even well-known companies, have not undertaken, completed, or maintained an inventory and catalog of the location and classification of the data in their: 1. environment, or; 2. their material risks. And therefore have not assessed the value and sensitivity, or the business confidentiality, of the data assets they collect, store or process in house, or are held, or are serviced on their behalf by third-parties.
  • 14. 14 When does a third-party risk become core to our risk? ● It is core to our risk if our partners cannot sustain an adequately protected environment. ● If an impact to them disrupts their ability to meet their obligations to us. ● If it impacts them financially shaking our confidence in the relationship. ● If our clients lose trust in us because of the third-party relationship. ● If through accident, carelessness, or malicious acts they are a conduit of attack. ● If our partners violation of compliance with contracts, laws, or duty of care impacts our clientʼs, their data, or their trust of us. ● In any violation of the law.
  • 15. 15 Due Diligence and Red Flags Assessing an Organization Assessing a Product or Service Oversight and accountability Focus, expertise and track record Leadership and vision Capacity to deliver and commitment to product Environment and culture Product or service quality and direction Controls and metrics Planned product support and investment Policies and practices Staffing, skills & turnover Technology and infrastructure Technology, Privacy, Operations & Continuity Compliance and reporting Technology Flags (Obsolescence, Proprietary, Commercial, IP ownership) Awareness and education Hardware and software verified and cleared sourcing Reputation and references Conformance to standards and regulation Financial Health Cost, and payment terms Supply Chain Integrity Contract and favorability of terms
  • 16. 16 Business is not static, for us, or for third-party partners. With business change, risk moves. Static assessments are a statement in time. Validity of the assessment changes because business is not static, and risk moves. This is true for our third-party and n-tier partners as much as it is for ourselves. Assessment is a reiterative process of risk classification, address and review. Business Objectives Material risks to objectives Mitigating Controls Validation of Effectiveness Ongoing Monitoring Internal and Third-Party Risk
  • 17. 17 Regardless of industry, structure, or relationship, and whether a product, service, or behavior, and whether effectiveness is initially assessed through inquiry, attestation, forms or checklist, contract, technology, or onsite audit, a cadence for periodic review should be established, the frequency of sampling or revisitation consistent with the risk, and with risk tolerance. Presence of Controls Adequacy of Controls Frequency of Use or Testing Validation of Effectiveness Four Conditions of Effectiveness – Identify, Address, Verify and Prove
  • 18. 18 When entering into a third-party Data Processing Agreement (DPA) for cloud services, important considerations include: ● Defining engagement specifics ● Ensuring GDPR compliance (Article 28) ● Establishing roles ● Specifying instructions ● Adhering to standards ● Detailing data aspects ● Outlining procedures ● Defining processes for data breach and Data Subject Request support. ● Conformance with CISPE (Code of Conduct for Cloud Providers) or other professional organization Cloud Processing
  • 19. Q&A
  • 21. © 2023 TrustArc Inc. Proprietary and Confidential Information. Contact Information Visit http://www.trustarc.com for more information on how TrustArc can help.