Third Party Network 2018
11th July 2018
Purpose-Built. Proven. Powerful.
Ā© Copyright 2018
2 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
Brenda Ferraro, ITIL, CPM, CTPRP, vBSIMM
Chief Third Party Evangelist & Senior Director –
Networks & CYBERFITĀ® PROPERTY OF NH-ISAC
Phone: +1 813-404-8371
Email: bferraro@prevalent.net
Sean O’Brien, CTPRP
Managing Director
DVV Solutions
Phone: +44 (0) 161 476 8700
Email: sobrien@dvvs.co.uk
What is a Vendor Network
The purpose of a Network is to build a membership based community of customers that share collaboratively with unique
needs amongst peers.
SIG SIG SIG SIG HCQ
Third Party Network
Channel Partner Driven
Governed by member
participation
LEGAL
ITLACON Driven
FINANCIAL
FS-ISAC Driven
CPG
Prevalent Driven
HEALTHCARE
NH-ISAC Governed with
CISO participation and
requirements.
BEST PRACTICES & CERTIFICATIONS: SOC2 / SCA / PCI / NIST / ISO
AUTHORITATIVE DOCUMENTS
GDPR
NY STATE
APPENDIX J
OCC
GDPR
NY STATE
APPENDIX J
OCC
GDPR
NY STATE
GDPR
NY STATE
APPENDIX J
OCC
GDPR
NY STATE
HIPAA
ACA
4 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
HISTORIC VIEW OF THIRD-PARTY RISK
MANUAL
Spreadsheet or
GRC driven
GRC IMPLEMENTATION
Takes years
MULTIPLE PRODUCTS
Used for assessment and
monitoring
VENDOR UNIVERSE
Not sure who
vendors are
ASSESSMENT COMPLETION
Not able to complete assessments and
meet compliance against regulations
and internal policies
ASSESSMENT TIMELINESS
Not able to assess prior to
business decision to bring on
a new vendor/service
5 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
REGULATORY SCRUTINY THEMES
PCI 3.2+
OUTSOURCER ACCOUNTABILITY
Third-Party security and data protection by way of
management of vendor outsourcing activity and
coordination of business resiliency programs.
ROBUST TPRM PROGRAM
Greater scrutiny of ā€˜fourth’ parties, the need for
collaboration and standardization to achieve
regulatory compliance, and vendor risk operational
processes.
GDPR SYCS 8.1
MATURE TPRG PROCESS
SALES PROCESS
&
CONTRACTING
OPERATIONS
TOOL
SETUP
THIRD PARTY
LAUNCH &
CONTENT
SUBMITTED
CONTENT
VALIDATED &
PUBLISHED
RISK
EVALUATED &
IDENTIFIED
RISK ACCEPTED,
TRACKED OR
DECLINED
THIRD PARTY
CONTINUOUS
EVALUATION
Signed Contract
Initial Third Party Universe List
Customer Maturity Assessment
Service Risk Framing Setup
Control Standards Identified
Compensating Control Library Uploaded
Supplemental Questionnaires Added
Notifications Setup
Customer Risk Ranking Setup
Risk Remediation Tracking Setup
Customer Reporting & Categories Setup
Setup Automated Assessment Kickoffs
Third Party Launch Schedule
Customer Professional Services Kickoff
and Setup Meeting(s) Conducted
Request for Response
Questionnaire / Evidence Submitted
Completed Questionnaire
Evidence Provided
Completed Questionnaire
Evidence Available for Validation
Validation Follow Up with Tracking
Questionnaire & Evidence Completeness
Published Evidence into Shared Repository
Inherent (Initial) Risk Score Applied by Industry
Available for Request and Risk Identification
Evidence Available for Request to Evaluate
Industry Applied Inherent Risk Score
Industry Standard ā€˜Met’ / ā€˜Does NOT Meet’ Identified
Assessor Compensating Control and Guidance Available
Business Risk Acceptance
Risk Acceptance Steering Committee
Compensating Control Acceptance
Risk Remediation Plan Acceptance
Risk Accepted
Risk Declined
Risk Acceptance Remediation Tracking
Residual Risk Score Adjusted
Environmental Risk
Situational Risk
Incident Response
Threat Monitoring
Fraud, Waste, Abuse
Regulatory Requirements
Industry Security Injects
Real Time Risk Evaluation
Data Based Risk Decisions
Industry Reporting
Industry Security MaturationQuestionnaire Evaluated
Compensating Control Applied
Third Party Negotiation Implemented for ID’d Risk
Customer Risk Ranking Applied
Risk Remediation Recommendations and Tracking
Residual Risk Score Applied by Industry
8 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
MATURE THIRD-PARTY
PROGRAM SETUP
AUTOMATED VALIDATION
RISK REMEDIATION DIRECTLY
WITH THIRD-PARTY VENDORS
REAL TIME SCORECARD &
COMPLIANCE REPORTING
CONTINUOUS ASSESSMENTS
& MONITORING
WHERE THIRD-PARTY RISK IS HEADING
9 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
UNIFIED THIRD-PARTY RISK MANAGEMENT
ASSESS SHAREMONITOR
Automate the vendor
assessment process,
including tiering, based on
the access level to
sensitive information.
Obtain access to open
source Cyber and
Business Intel feeds to
validate security controls
are effective and in force.
Collect once, share with
many saving both time
and money in the
assessment process.
10 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
ASSESS
Assessment data collection takes time and money
Automate the vendor assessment process, including the critical
vendor tiering process, based on the access level they have to
your sensitive information
• Controls Mapping
• Risk Scoring
• Service Framing
• Standardized Risk Assessment Content – SIG, SIG-Lite, CSA, DDQ
• Risk Base Assessments
• Automate Evidence Collection, Findings Review, and Risk Mitigation
Workflows
• Full Audit Tracking
• Comprehensive Analytics & Reporting
11 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
MONITOR
One and done assessments are a thing of the past
Data | Brand | Financial | Operational | Regulatory
• Filling a gap: ā€˜Outside In’ continuous assessments
provides real-time risk management
• Never be in the dark: Potential risk events should be
surfaced, scored, and delivered to users continuously
• Comprehensive scoring: Data and business risk scoring
combined with ā€˜Inside Out’ assessment scoring provides
insight into vendor investments
12 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
SHARE
Collect once, share with many – reduces cost and time in the
assessment process
• Many industry verticals use the same vendors and want
similar security controls information about those vendors
• Collecting questionnaire evidence on behalf of Network
members reduces the time and money spent on data collection
and validation
• Allows assessment programs ability to focus on risk
management
• Increases security maturity across the third party ecosystem
13 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
ASSESS
MONITOR
SHARE
Third Party Assessment
Automation, including
Prioritization, based on data
access level
Continuous & Holistic Risk View across 5 key areas: Data,
Brand, Financial, Operational, & Regulatory
Collect once and share with many to
reduce cost and time
SITUATIONAL
INHERENT
MANAGED
RESIDUAL
RISK
CONTINUOUS THIRD-PARTY RISK LIFECYCLE
Reliance on static scheduled assessments is no longer sufficient to monitor the rapidly changing third party risk environment
14 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
VENDOR NETWORK (XVN) – VENDOR LAUNCH & EVIDENCE COLLECTION & REPOSITORY POPULATION SUBPROCESSESCUSTOMER
CUSTOMERSUPPORT
MANAGEMENT
THIRDPARTY
COLLECTION
PROCESS
ESCALATION
PROCESS
MEMBER TO
VENDOR LETTER
(M2V) SENT
V1 V7
V8
V11
6 DAYS 5 DAYS 3 DAYS 2 DAYS
PREVALENT CC D
RECEIVE MEMBER
TO VENDOR
(M2V) LETTER
V2
PREVALENT TO
VENDOR (P2V)
LETTER SENT
V3
RECIEVE
PREVALENT TO
VENDOR (P2V)
LETTER
LAUNCH
ASSESSMENT
PROCESS
V4
V5
RECEIVE
REGISTRATION
NOTIFICATION
V6
REGISTERED?
N
Y
NEED TOOL
ASSISTANCE?
N
PROVIDE TOOL
ASSISTANCE
V9
INTERNAL
COMMUNICATION
PROCESS
EVIDENCE
COLLECTION
REVIEW
V10
TIMELY
RESPONSE?
N
ASSESSMENT
INTO TENANT
PROCESS
V11
RECEIVE TENANT
UPDATE
NOTIFICATION
RESPOND TO
IDENTIFIED
RISKS AND
CONTROL
STANDARD
GAPS
RISK
EVALUATION
PROCESS
3 DAYS
Reduce
Assessment
Data Content
Gathering
Readily
Available
Assessments
in the Shared
Network
Repository
Focus on Risk
Identification
and Mitigation
15 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
ONLINE THIRD-PARTY PROCESSING & MONITORING
EVENT DRIVEN
Quick and interactive access to
accumulated data and will
receive a decision supporting
analysis result to reduce risk to
the enterprise.
SHARE
Remove work duplication by
completing assessment
questionnaires and uploading
authoritative documentation
once to share with many.
16 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
NETWORK VISION & COMMITMENT
Answer Questionnaires
Store Evidence
Manage Access
Assist in Compliance
Conduct Assessments
Identify Risk
Clarifying Observations
Create Findings/Remediation
VENDOR MANAGEMENT
ASSESSMENT
DASHBOARDING & SCORING
Monitor Cyber & Business Intel, Manage Risk,
Measure Key Performance Indicators
WHAT IS THE ROLE AND RESPONSIBILITY OF
THE NETWORK COMMUNITY
 Overall Governance Input
 Content Management
 Control Standard Requirements & Recommendation
 Best Practice / Thought Leadership
 Risk Landscape Awareness
 Early Adoption of Leading Edge Methodology and Framework
17 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
JOINING THE THIRD PARTY NETWORK
HOW TO GET
INVOLVED
• Steering Committee
Members (1 Day per
Qtr)
• Require Licensing
Contract with DVV
Solutions
WHAT IS THE COST
• DVV Solutions will
contact you
WHAT IS THE PROCESS
• Reach-out by end of
week
• Call scheduled by
20 July 2018
• First Steering
Committee Mtg by
24 September 2018
18 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
Q & A
19 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
Brenda Ferraro, ITIL, CPM, CTPRP, vBSIMM
Chief Third Party Evangelist & Senior Director –
Networks & CYBERFITĀ® PROPERTY OF NH-ISAC
Phone: +1 813-404-8371
Email: bferraro@prevalent.net
Sean O’Brien, CTPRP
Managing Director
DVV Solutions
Phone: +44 (0) 161 476 8700
Email: sobrien@dvvs.co.uk

More Related Content

PDF
Standards in Third Party Risk - DVV Solutions ISACA North May 19
PDF
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
PDF
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
PPTX
Vendor risk management webinar 10022019 v1
PPTX
Cyber security cgi moving forward
DOCX
A Case Study on Payment Card Industry Data Security Standards
PDF
Emerging Trends in Information Security and Privacy
PDF
Emerging Trends in Information Privacy and Security
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Building the Business Case for TPRM - DVV Solutions Breakfast Briefing March ...
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
Vendor risk management webinar 10022019 v1
Cyber security cgi moving forward
A Case Study on Payment Card Industry Data Security Standards
Emerging Trends in Information Security and Privacy
Emerging Trends in Information Privacy and Security

What's hot (20)

PDF
TrustedAgent GRC for Public Sector
PDF
Don't let them take a byte
PPTX
Docker container webinar final
PDF
TrustedAgent and Defense Industrial Base (DIB)
PPTX
General Data Protection Regulation (GDPR)
PDF
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
PDF
Effectively managing operational risk
PPT
PCI DSS Certification
PDF
2018 LexisNexis Fraud Mitigation Study
PPTX
HEMISPHERE SMB Case Study
PDF
CDCATInsurance 2016
PDF
Security Incident Response Readiness Survey
PDF
CSA Introduction 2013 David Ross
PDF
MCGlobalTech Cyber Capability Statement_Final
PDF
PDF
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
PDF
Bsi supply-chain-solutions-overview-brochure
PDF
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
PPTX
Slideshare fintech-may26th-def
Ā 
PDF
Active security monitoring
TrustedAgent GRC for Public Sector
Don't let them take a byte
Docker container webinar final
TrustedAgent and Defense Industrial Base (DIB)
General Data Protection Regulation (GDPR)
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Effectively managing operational risk
PCI DSS Certification
2018 LexisNexis Fraud Mitigation Study
HEMISPHERE SMB Case Study
CDCATInsurance 2016
Security Incident Response Readiness Survey
CSA Introduction 2013 David Ross
MCGlobalTech Cyber Capability Statement_Final
How to Steer Cyber Security with Only One KPI: The Cyber Risk Resilience
Bsi supply-chain-solutions-overview-brochure
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
Slideshare fintech-may26th-def
Ā 
Active security monitoring
Ad

Similar to Third Party Network Webinar Slide Deck 110718 FINAL (20)

PDF
TrustArc Webinar - Mitigating Third-Party Risks: Best Practices for CISOs in ...
PDF
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
PPTX
Ivanti Threat Thursday for January 23
Ā 
PPTX
type of Vendor management in civil engineering
PPTX
Third Party Risk Management
PPTX
Managing Third-Party Risk Effectively
PDF
DVV Solutions About Us Datasheet
PPTX
Supply Chain and Third-Party Risks During COVID-19
PPT
What the Cloud Vendors Don't Want You to Know
PDF
TPRM Made Easy - 4 Dimension TPRM Framework
PDF
Need for Action (GDPR Risk Mgmt) Oct'16
PPTX
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
PDF
Vendor Risk Mgmt Ravi-Licata
PDF
Your Third-Party Vendor's Risk Is Your Risk, Too
PDF
Do you really know your third party providers?
PPTX
Cyber Security Services Risk Management Solutions | Ampcus Inc
PPTX
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
PDF
CNIT 160 Ch 4c: Security Program Development (Part 3)
PDF
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
PDF
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
TrustArc Webinar - Mitigating Third-Party Risks: Best Practices for CISOs in ...
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
Ivanti Threat Thursday for January 23
Ā 
type of Vendor management in civil engineering
Third Party Risk Management
Managing Third-Party Risk Effectively
DVV Solutions About Us Datasheet
Supply Chain and Third-Party Risks During COVID-19
What the Cloud Vendors Don't Want You to Know
TPRM Made Easy - 4 Dimension TPRM Framework
Need for Action (GDPR Risk Mgmt) Oct'16
Vendor Management for PCI DSS; EI3PA; HIPAA and FFIEC
Vendor Risk Mgmt Ravi-Licata
Your Third-Party Vendor's Risk Is Your Risk, Too
Do you really know your third party providers?
Cyber Security Services Risk Management Solutions | Ampcus Inc
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CNIT 160 Ch 4c: Security Program Development (Part 3)
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
š‘š¢š¬š¤ š€š§ššš„š²š¬š­ šˆš§š­šžš«šÆš¢šžš° šš®šžš¬š­š¢šØš§š¬
Ad

Recently uploaded (20)

PDF
Transform Your ITILĀ® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A review of recent deep learning applications in wood surface defect identifi...
PDF
Five Habits of High-Impact Board Members
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPT
What is a Computer? Input Devices /output devices
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
STKI Israel Market Study 2025 version august
PDF
Unlock new opportunities with location data.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
O2C Customer Invoices to Receipt V15A.pptx
Transform Your ITILĀ® 4 & ITSM Strategy with AI in 2025.pdf
Group 1 Presentation -Planning and Decision Making .pptx
A review of recent deep learning applications in wood surface defect identifi...
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
observCloud-Native Containerability and monitoring.pptx
Zenith AI: Advanced Artificial Intelligence
Univ-Connecticut-ChatGPT-Presentaion.pdf
What is a Computer? Input Devices /output devices
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
Tartificialntelligence_presentation.pptx
Enhancing emotion recognition model for a student engagement use case through...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
STKI Israel Market Study 2025 version august
Unlock new opportunities with location data.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Module 1.ppt Iot fundamentals and Architecture
O2C Customer Invoices to Receipt V15A.pptx

Third Party Network Webinar Slide Deck 110718 FINAL

  • 1. Third Party Network 2018 11th July 2018 Purpose-Built. Proven. Powerful. Ā© Copyright 2018
  • 2. 2 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 Brenda Ferraro, ITIL, CPM, CTPRP, vBSIMM Chief Third Party Evangelist & Senior Director – Networks & CYBERFITĀ® PROPERTY OF NH-ISAC Phone: +1 813-404-8371 Email: bferraro@prevalent.net Sean O’Brien, CTPRP Managing Director DVV Solutions Phone: +44 (0) 161 476 8700 Email: sobrien@dvvs.co.uk
  • 3. What is a Vendor Network The purpose of a Network is to build a membership based community of customers that share collaboratively with unique needs amongst peers. SIG SIG SIG SIG HCQ Third Party Network Channel Partner Driven Governed by member participation LEGAL ITLACON Driven FINANCIAL FS-ISAC Driven CPG Prevalent Driven HEALTHCARE NH-ISAC Governed with CISO participation and requirements. BEST PRACTICES & CERTIFICATIONS: SOC2 / SCA / PCI / NIST / ISO AUTHORITATIVE DOCUMENTS GDPR NY STATE APPENDIX J OCC GDPR NY STATE APPENDIX J OCC GDPR NY STATE GDPR NY STATE APPENDIX J OCC GDPR NY STATE HIPAA ACA
  • 4. 4 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 HISTORIC VIEW OF THIRD-PARTY RISK MANUAL Spreadsheet or GRC driven GRC IMPLEMENTATION Takes years MULTIPLE PRODUCTS Used for assessment and monitoring VENDOR UNIVERSE Not sure who vendors are ASSESSMENT COMPLETION Not able to complete assessments and meet compliance against regulations and internal policies ASSESSMENT TIMELINESS Not able to assess prior to business decision to bring on a new vendor/service
  • 5. 5 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 REGULATORY SCRUTINY THEMES PCI 3.2+ OUTSOURCER ACCOUNTABILITY Third-Party security and data protection by way of management of vendor outsourcing activity and coordination of business resiliency programs. ROBUST TPRM PROGRAM Greater scrutiny of ā€˜fourth’ parties, the need for collaboration and standardization to achieve regulatory compliance, and vendor risk operational processes. GDPR SYCS 8.1
  • 6. MATURE TPRG PROCESS SALES PROCESS & CONTRACTING OPERATIONS TOOL SETUP THIRD PARTY LAUNCH & CONTENT SUBMITTED CONTENT VALIDATED & PUBLISHED RISK EVALUATED & IDENTIFIED RISK ACCEPTED, TRACKED OR DECLINED THIRD PARTY CONTINUOUS EVALUATION Signed Contract Initial Third Party Universe List Customer Maturity Assessment Service Risk Framing Setup Control Standards Identified Compensating Control Library Uploaded Supplemental Questionnaires Added Notifications Setup Customer Risk Ranking Setup Risk Remediation Tracking Setup Customer Reporting & Categories Setup Setup Automated Assessment Kickoffs Third Party Launch Schedule Customer Professional Services Kickoff and Setup Meeting(s) Conducted Request for Response Questionnaire / Evidence Submitted Completed Questionnaire Evidence Provided Completed Questionnaire Evidence Available for Validation Validation Follow Up with Tracking Questionnaire & Evidence Completeness Published Evidence into Shared Repository Inherent (Initial) Risk Score Applied by Industry Available for Request and Risk Identification Evidence Available for Request to Evaluate Industry Applied Inherent Risk Score Industry Standard ā€˜Met’ / ā€˜Does NOT Meet’ Identified Assessor Compensating Control and Guidance Available Business Risk Acceptance Risk Acceptance Steering Committee Compensating Control Acceptance Risk Remediation Plan Acceptance Risk Accepted Risk Declined Risk Acceptance Remediation Tracking Residual Risk Score Adjusted Environmental Risk Situational Risk Incident Response Threat Monitoring Fraud, Waste, Abuse Regulatory Requirements Industry Security Injects Real Time Risk Evaluation Data Based Risk Decisions Industry Reporting Industry Security MaturationQuestionnaire Evaluated Compensating Control Applied Third Party Negotiation Implemented for ID’d Risk Customer Risk Ranking Applied Risk Remediation Recommendations and Tracking Residual Risk Score Applied by Industry
  • 7. 8 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 MATURE THIRD-PARTY PROGRAM SETUP AUTOMATED VALIDATION RISK REMEDIATION DIRECTLY WITH THIRD-PARTY VENDORS REAL TIME SCORECARD & COMPLIANCE REPORTING CONTINUOUS ASSESSMENTS & MONITORING WHERE THIRD-PARTY RISK IS HEADING
  • 8. 9 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 UNIFIED THIRD-PARTY RISK MANAGEMENT ASSESS SHAREMONITOR Automate the vendor assessment process, including tiering, based on the access level to sensitive information. Obtain access to open source Cyber and Business Intel feeds to validate security controls are effective and in force. Collect once, share with many saving both time and money in the assessment process.
  • 9. 10 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 ASSESS Assessment data collection takes time and money Automate the vendor assessment process, including the critical vendor tiering process, based on the access level they have to your sensitive information • Controls Mapping • Risk Scoring • Service Framing • Standardized Risk Assessment Content – SIG, SIG-Lite, CSA, DDQ • Risk Base Assessments • Automate Evidence Collection, Findings Review, and Risk Mitigation Workflows • Full Audit Tracking • Comprehensive Analytics & Reporting
  • 10. 11 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 MONITOR One and done assessments are a thing of the past Data | Brand | Financial | Operational | Regulatory • Filling a gap: ā€˜Outside In’ continuous assessments provides real-time risk management • Never be in the dark: Potential risk events should be surfaced, scored, and delivered to users continuously • Comprehensive scoring: Data and business risk scoring combined with ā€˜Inside Out’ assessment scoring provides insight into vendor investments
  • 11. 12 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 SHARE Collect once, share with many – reduces cost and time in the assessment process • Many industry verticals use the same vendors and want similar security controls information about those vendors • Collecting questionnaire evidence on behalf of Network members reduces the time and money spent on data collection and validation • Allows assessment programs ability to focus on risk management • Increases security maturity across the third party ecosystem
  • 12. 13 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 ASSESS MONITOR SHARE Third Party Assessment Automation, including Prioritization, based on data access level Continuous & Holistic Risk View across 5 key areas: Data, Brand, Financial, Operational, & Regulatory Collect once and share with many to reduce cost and time SITUATIONAL INHERENT MANAGED RESIDUAL RISK CONTINUOUS THIRD-PARTY RISK LIFECYCLE Reliance on static scheduled assessments is no longer sufficient to monitor the rapidly changing third party risk environment
  • 13. 14 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 VENDOR NETWORK (XVN) – VENDOR LAUNCH & EVIDENCE COLLECTION & REPOSITORY POPULATION SUBPROCESSESCUSTOMER CUSTOMERSUPPORT MANAGEMENT THIRDPARTY COLLECTION PROCESS ESCALATION PROCESS MEMBER TO VENDOR LETTER (M2V) SENT V1 V7 V8 V11 6 DAYS 5 DAYS 3 DAYS 2 DAYS PREVALENT CC D RECEIVE MEMBER TO VENDOR (M2V) LETTER V2 PREVALENT TO VENDOR (P2V) LETTER SENT V3 RECIEVE PREVALENT TO VENDOR (P2V) LETTER LAUNCH ASSESSMENT PROCESS V4 V5 RECEIVE REGISTRATION NOTIFICATION V6 REGISTERED? N Y NEED TOOL ASSISTANCE? N PROVIDE TOOL ASSISTANCE V9 INTERNAL COMMUNICATION PROCESS EVIDENCE COLLECTION REVIEW V10 TIMELY RESPONSE? N ASSESSMENT INTO TENANT PROCESS V11 RECEIVE TENANT UPDATE NOTIFICATION RESPOND TO IDENTIFIED RISKS AND CONTROL STANDARD GAPS RISK EVALUATION PROCESS 3 DAYS Reduce Assessment Data Content Gathering Readily Available Assessments in the Shared Network Repository Focus on Risk Identification and Mitigation
  • 14. 15 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 ONLINE THIRD-PARTY PROCESSING & MONITORING EVENT DRIVEN Quick and interactive access to accumulated data and will receive a decision supporting analysis result to reduce risk to the enterprise. SHARE Remove work duplication by completing assessment questionnaires and uploading authoritative documentation once to share with many.
  • 15. 16 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 NETWORK VISION & COMMITMENT Answer Questionnaires Store Evidence Manage Access Assist in Compliance Conduct Assessments Identify Risk Clarifying Observations Create Findings/Remediation VENDOR MANAGEMENT ASSESSMENT DASHBOARDING & SCORING Monitor Cyber & Business Intel, Manage Risk, Measure Key Performance Indicators WHAT IS THE ROLE AND RESPONSIBILITY OF THE NETWORK COMMUNITY  Overall Governance Input  Content Management  Control Standard Requirements & Recommendation  Best Practice / Thought Leadership  Risk Landscape Awareness  Early Adoption of Leading Edge Methodology and Framework
  • 16. 17 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 JOINING THE THIRD PARTY NETWORK HOW TO GET INVOLVED • Steering Committee Members (1 Day per Qtr) • Require Licensing Contract with DVV Solutions WHAT IS THE COST • DVV Solutions will contact you WHAT IS THE PROCESS • Reach-out by end of week • Call scheduled by 20 July 2018 • First Steering Committee Mtg by 24 September 2018
  • 17. 18 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 Q & A
  • 18. 19 Purpose-Built. Proven. Powerful. Ā© Copyright 2018 Brenda Ferraro, ITIL, CPM, CTPRP, vBSIMM Chief Third Party Evangelist & Senior Director – Networks & CYBERFITĀ® PROPERTY OF NH-ISAC Phone: +1 813-404-8371 Email: bferraro@prevalent.net Sean O’Brien, CTPRP Managing Director DVV Solutions Phone: +44 (0) 161 476 8700 Email: sobrien@dvvs.co.uk