blog-hero-background-image
Third Party Risk Management

CISOs Are Using This To Automate Third-Party Vendor Assessments

backdrop
Table of Contents

Join thousands of professionals and get the latest insight on Compliance & Cybersecurity.


Gartner polled enterprise compliance and legal execs. 

As you may guess, due to growing concerns, one of the survey questions was to uncover risks from 3rd-party vendors. What the study found? Rethinking vendor assessments has become increasingly crucial. 

According to the report:

CISOs and enterprise security managers must take this finding seriously as it tells a crucial story

CISOs and enterprise security managers must take this finding seriously as it tells a crucial story. What story does it tell, relative to third-party vendor risk management (TPRM), you ask?

Well, the answer is straightforward: 

 

One-Time Assessments Don’t Mitigate Vendor Risks

And it makes sense.

You can create a well-detailed security questionnaire that properly assesses vendors before joining your organization’s supply chain network. But detailed as your questionnaire might be, they don’t guarantee the detection and prompt mitigation of new risks after vendors get the nod. 

In short, they don’t guarantee that vendors who went the extra mile to pass your initial checks and win your company’s business are honest. Dustin Bailey, Fmr. Security Lead at Twilio, hammered on this. 

In his words

Dustin Bailey - Quote

This poses an apt question: How should proactive enterprise security executives like yourself approach vendor risk assessments today? 

I’ll answer this question by showing you how to go beyond one-time questionnaires for vendor assessments. Disclaimer: Our interoperable cybersecurity and compliance automation platform, Cyber Sierra, makes it possible and also streamlines the process.

Before we dive in…

illustration background

Join SMSW

Get actionable insights on mitigating cybersecurity, compliance, and cyber risks sent to your inbox weekly.

card image

How Should Vendor Risk Assessments Be Done?

It should be ongoing. 

And the reasons are simple. First, CISOs can no longer afford to assess vendors once, no matter how detailed the security questionnaires used are, and go to sleep. Second, a BlueVoyant survey of top executives globally responsible for cybersecurity in their organizations supports this. 

The study saw a whopping 93% of respondents say they suffered breaches due to weaknesses in their supply chains. Considering breaches in supply chains are usually from third-party vendors, the study uncovered even more troubling data. 

These breaches are getting worse

average number of breaches

Based on this trend, here’s how we recommend going beyond one-time assessments to mitigate as much vendor risk as possible. 

 

1. Categorize Vendors Based On Risk Level 

The more access to your organization’s critical cloud and network environments a vendor has, the more they are likely to increase your risk surface area. The same goes for vendors who will rely on other vendors (4th parties) to fulfill their duties to your company.

But it doesn’t end there. 

The type of solution a 3rd party brings to your company and their geographic location also matters. For instance, companies located in jurisdictions with weak compliance regulations are less likely to have security measures in place. All this creates the need to categorize and prioritize vendors your team must pay constant attention to. 

Our recommendation? 

Do this the moment you want to start assessing them. 

With Cyber Sierra, for instance, your security team is prompted to categorize vendors based on the criteria above from the get-go. You can easily profile vendors when initiating an assessment by: 

  • Indicating if an advanced assessment is needed
  • Choosing an assessee type (service, software, etc.) 
  • Selecting the third-party vendor’s country of location: 

Selecting the third-party vendor’s country of location

 

2. Automate Uncovering Vendors Who Fail Assessments

Does this look familiar?

Manually Uncovering Vendors Who Fail Assessments

You know the drill. Send assessment questionnaires to vendors in spreadsheets, have a yes/no answer column, yet still go back and forth, chasing them to send evidence of controls. 

Do it for just a couple dozens of vendors, and you risk: 

  • Delaying the approval of compliant vendors who could be driving the business forward
  • Losing important files in the maze of too much back and forth
  • Approving vendors mistakenly whose security controls evidence aren’t verified. 

Automating vendor assessments with Cyber Sierra helps mitigate these risks effectively. Our platform streamlines the entire process by allowing vendors to answer security questions and upload evidence for the same in one place, instead of using spreadsheets. 

Your security team can filter or search vendors based on various criteria used to profile them. And you can see their progress in uploading evidence for assessment questionnaires in one view:

Automate Uncovering Vendors Who Fail Assessments

 

3. Enforce Ongoing Vendor Risk Assessments

Send assessments to 3rd parties with Cyber Sierra, and they’ll receive an email with instructions on how to complete your questionnaires. But instead of just ticking yes/no to security questions, your team can enforce uploading evidence for their answers. 

Here’s a peek into a vendor’s view: 

Enforce Ongoing Vendor Risk Assessments

As shown above, they can:

  1. Answer security questions in one click.
  2. Upload evidence for each question answered and leave comments for your security team (your team can respond, too). 
  3. Assign their teammates to answer questions or upload evidence.
  4. And more importantly, get uploaded evidence auto-verified by clicking on “Get Verified.” 

On your team’s side, Cyber Sierra enables continuous risk assessments through two effective approaches. First, our platform automatically verifies uploaded evidence and flags unverified ones: 

our platform automatically verifies uploaded evidence and flags unverified ones

Second, you can mandate vendors to click on the “Get Verified” button, say monthly, and it triggers an auto-verification process in the background. This way, you can even enforce ongoing assessments. 

To see all this in action:

illustration background

Automate Third-Party Risk Assessments

Streamline sending and management of security questionnaires. Continuously enforce and auto-verify uploaded vendor assessment evidence, all in one place.

card image

Do I Still Need Vendor Risk Assessment Questionnaire Templates?

A recent article in CSO Online by Andy Ellis, Advisory CISO at Orca Security, lays the foundation for answering this question. 

Andy wrote

Andy Ellis - Quote

 

In other words, vendor risk assessment questionnaire templates still have a place. However, simply adding more questions to templates and scoring vendor risks based on their answers is insufficient. As Andy observed, it won’t help your team understand the actual risks 3rd parties pose to your organization. 

We recommend the following.

Begin the process by using appropriate security questionnaire templates. But don’t rely on them blindly. Instead, select questions relevant to a specific vendor and focus on getting them to upload verifiable evidence of having crucial security controls. 

Cyber Sierra simplifies the process of doing this. Your team can choose from our prebuilt assessment questionnaire templates (or upload any custom one). More importantly, when doing so, you can select specific questions a vendor must answer and upload evidence: 

More importantly, when doing so, you can select specific questions a vendor must answer and upload evidence

 

Streamline Vendor Risk Assessments

Managing third-party risks is a necessity. 

The only other way around it is to do away with vendors completely. But this isn’t possible, as your organization also needs them to extend its capabilities and stay competitive. In short, effective and efficient third-party vendor management (TPRM) processes can unlock the highest value for the effort expended. 

Dustin Bailey corroborates:

Dustin Bailey - Quote-1

The question then is: How do you ensure your organization’s TPRM processes are effective and efficient? Your team can do this by streamlining the process, starting from the vendor assessment step. 

And that’s where Cyber Sierra comes in: 

illustration background

Automate Third-Party Risk Assessments

Streamline sending and management of security questionnaires. Continuously enforce and auto-verify uploaded vendor assessment evidence, all in one place.

card image
  • Third Party Risk Management
  • CISOs
  • CTOs
  • Cybersecurity Enthusiasts
  • Enterprise Leaders
  • Startup Founders
Pramodh Rai

Meet Pramodh Rai, a technology aficionado and Cyber Sierra's co-founder, whose zest for innovation is fuelled by a cupboard stacked with zero-sugar Redbull. With a nimble footwork through the tech tulips across Asia Pacific, he's donned hats at Hmlet (the proptech kind) and Funding Societies | Modalku, building high-performing teams and technologies. A Barclays prodigy with dual degrees from Nanyang Technological University, Pramodh is a treasure trove of wisdom, dad jokes, and everything product/tech. He's the Sherpa in sneakers you need.

A weekly newsletter sharing actionable tips for CTOs & CISOs to secure their software.


Thank you for subscribing!

Please check your email to confirm your email address.

Find out how we can assist you in
completing your compliance journey.

toaster icon

Thank you for reaching out to us!

We will get back to you soon.