CIOReview CIOReview
Women In Tech Review
  • Home
  • Technology
    • Agile
    • Artificial Intelligence
    • Audiovisual
    • Big Data
    • BlockChain
    • Business Intelligence
    • BYOD
    • Cloud
    • Cloud Migration
    • Cognitive
    • Content Delivery Network
    • Data Analytics
    • Data Integration
    • Data Visualization
    • Digital Accessibility
    • Digital Transformation
    • Digital Twin
    • Drone
    • E-Waste Management
    • Enterprise Architecture
    • FinTech
    • Gaming Tech
    • High Performance Computing
    • Infrastructure Security
    • Insight Engines
    • Internet Of Things
    • Machine Vision
    • Mainframe
    • Metaverse
    • Mobile Application
    • Networking
    • Predictive Analytics
    • Quantum Computing
    • Remote Tech
    • Robotics
    • RPA
    • SDN
    • Security
    • Simulation
    • Smart City
    • SOAR
    • Video Solutions
    • Virtual Data Room
    • Virtualization
    • Web Development
    • Wireless
  • Industry
    • Ad Agencies
    • Aerospace
    • Africa
    • Agtech
    • Automotive
    • Aviation
    • Banking & Insurance
    • Banking and Finance
    • Biotech
    • Canada us
    • Casino
    • Chemical & Allied
    • Construction
    • Consumer Packaged Goods
    • Contact Center
    • Defense
    • E-Commerce
    • Education
    • EMR-EHR
    • Energy
    • Financial Services
    • Food and Beverages
    • Government
    • Healthcare
    • Law Enforcement
    • Legal
    • Manufacturing
    • Marine
    • Media & Entertainment
    • Metals & Mining
    • Naval Tech
    • Non Profit Technology
    • Oil & Gas
    • Pharma & life sciences
    • Proptech
    • Public Sector
    • Retail
    • Sports
    • Startups
    • Telecom
    • Textile & Apparel
    • Travel & hospitality
    • UAE
    • Utilities
  • Platforms
    • Acumatica
    • Adobe
    • Amazon
    • Cisco
    • Dassault Systemes
    • Dell
    • DevOps
    • Google
    • HPE
    • HubSpot
    • IBM
    • Infor
    • Magento
    • Microsoft
    • NetApp
    • NetSuite
    • Oracle
    • Red Hat
    • Sage
    • Salesforce
    • SAP
    • SAS
    • Shopify
    • VMware
  • Functions
    • Compliance
    • Contract Management
    • Corporate Finance
    • Digital Marketing
    • Environmental Health And Safety
    • GDPR
    • Human Resource
    • Logistics
    • Procurement
    • Sales Tech
    • Supply Chain
  • Conferences
  • About Us
Go to...

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    • Home
    • Legal Tech Latam

    Third Party Due Diligence: Be a Good Example-Not a Horrible Warning

    By Melinda Burrows, VP and Corporate Compliance Lead at Outerwall And Margaret Chrzanowska, Director of Information Security at Outerwall

    Join With Our Contributor Network

    On progress..
    Success! Thanks For Joining With Our Contributor Network.
    You Have Already Joined With Our Contributor Network
    Sorry! Something went wrong. Please try again.
    Third

    Melinda Burrows, VP and Corporate Compliance Lead at Outerwall

    It’s midnight. Do you know where your customer’s data is? Have you shared that data with a third party?  If you have, are you comfortable with the third party’s approach to data security, and do they take it as seriously as you do?

    As consumers more directly feel the brunt of data security fallout, they’re becoming more interested and concerned about how much data they’re willing to share, what companies do with the data they collect and how the data is secured. According to a new 2016 report from the TRUSTe/National Cyber Security Alliance (NCSA) Consumer Privacy Index, American consumers feel more concerned about the privacy of their data than the loss of their personal income. 

    It’s a Risky Business  

    According to the Ponemon Institute’s 2015 Cost of Data Breach Global Study, the total cost of a data breach is $3.8 million. The brand reputation impact is unquantifiable, as the impact can be felt for years to come after the breach because shifting negative perceptions takes time.   

    Consider this: the NCSA Consumer Privacy Index report showed that 89 percent of American consumers say they avoid companies that do not protect their privacy. It only takes one mistake to fracture trust with your customers. And that mistake may be sharing sensitive information with a third party. According to PricewaterhouseCoopers’ 2016 Global State of Information Security Survey, “[security] incidents attributed to business partners climbed 22 percent,” from 2014 to 2015.”  

    “‘Third-party due diligence must be robust, thorough, impeccably documented and preserved.’— Former U.S. Department of Justice Fraud Section Deputy Chief Mark Mendelsohn (2005–2010)”  

    Unfortunately, many organizations do not:
    • Know which suppliers have access to sensitive data, 
    • Require suppliers to comply with security policies, or 
    • Assess data security compliance of suppliers. 

    Regardless of your company’s size or industry, a multi-phase, risk-based approach is recommended to develop or to shore up your third party due diligence program. This approach should assess the type(s) of data provided to outside organizations and the way in which these organizations use and protect the data to determine the level of diligence and monitoring required.

    Phase I: Establish a Governance Model, Policies and Procedures  

    The first phase aims to establish the program strategy and governance, as well as set the policies, processes, standards and guidelines to be followed. It will likely be the lengthiest phase, as it requires much research, analysis and developing recommendations.   

    At the inception of the project you should engage company’s executive leadership and secure their support. And don’t overlook your company’s Board of Directors. Given the risk levels and impact when something goes awry, PricewaterhouseCoopers’ 2016 Global State of Information Security Survey showed that 45 percent of respondents noted their Board is involved in the overall security strategy.  

    After obtaining leadership support, you should determine your level of risk, beginning with identifying existing third parties with access to your company’s data, as well as the type of data being shared. This can be done internally with existing, capable team members, or externally by a third party. 

    In conducting the risk assessment, be sure to engage your technology organization, business owners who collect and manage customer and employee data, and personnel involved in developing and managing contracts such as your legal and supply chain organizations.  

    Once you have identified the types of data shared with third parties, design a vendor vetting and monitoring process that is stratified based on identified risk tiers. As an example, your model may include the following tiers (Tier 1 is highest risk requiring highest level of assessment and monitoring):  

    • Tier 1: Suppliers who manage personally-identifiable information (PII) and critical systems, such as Human Resources Information Systems (HRIS) or credit card processors.  
    • Tier 2: These include suppliers who manage PII – or– critical systems, such as third party customer service or customer analytics providers.
    • Tier 3: This tier comprises suppliers who manage non-PII or other sensitive data.  

    Once the tier levels and corresponding assessment and monitoring standards have been determined, requirements should be documented in policies and procedures that are clear, concise and accessible to all involved in the contracting process.

      Regardless of your company’s size or industry, a multi-phase, risk-based approach is recommended to develop or to shore up your third party due diligence program  

    Following this work, you’re ready to move into the next phase.   

    Phase II: Transform your Vendor risk Management Profile  

    The second phase aims to operationalize your program, build awareness of the new program and deliver training to those who will be key players in the vendor compliance and management program. In this phase you’ll begin to see the operational process running and be able to identify issues or gaps and correct them. 

    This phase may also include retroactive work to bring existing third-party relationships in compliance with your new standards. The organization should make risk-based determinations regarding whether and when to fill security and compliance gaps with existing vendors by reviewing the risk tier along with the scope, materiality and remaining contract term with the existing vendor.    

    While Phase I was the lengthiest, Phase II may be the most challenging as you work to build awareness, improve security and drive compliance. People are often averse to change, particularly when the change may disrupt existing and long-term vendor relationships. Shifting behaviors takes time and patience; it will be important to leverage the leadership support secured during Phase I to drive the necessary change.  

    Phase III: Sustain the Momentum  

    Ideally, in this phase your program should begin to function like a well-oiled machine. With processes, systems and technology in place, you should be able to shift to programmatic monitoring and oversight, while reporting regularly against pre-defined metrics.   

    Your goal in this phase of the program is continuous improvement.   

    Manage the Risks  

    As the Internet of Things (IoT) continues to grow, so do the data security risks, both internally—for the data your company manages–and externally–for your company’s data managed by third parties.   

    Don’t serve as a horrible warning to other companies, but do work to get your third party due diligence program in place now, using best practices from those who have gone before you. Above all, ensure you have a program which flexes sufficiently based on your company’s needs and shifting risk profile.  

    On The Deck

    • Mainframe Migration Special

      2025-01-10

      #
    • Field Service Special

      2024-10-01

      #

    Editor's Pick

    • Unlocking the Power of Real-World Data: Driving Innovation and Impact in Life Sciences
      Unlocking the Power of Real-World Data: Driving Innovation and Impact in Life Sciences

      By Denise Juliano, Group Vice President of Life Sciences, Premier Applied Sciences

    • Scaling AI, Automation, And Workforce Innovation For The Future
      Scaling AI, Automation, And Workforce Innovation For The Future

      By Roberto Tovar Arellano, Digital & Data Tech Bp Manager

    • Trends Driving Automation Innovation
      Trends Driving Automation Innovation

      By CIO Review

    • Australian Government Expands AWS Partnership to Accelerate Digital Transformation
      Australian Government Expands AWS Partnership to Accelerate Digital Transformation

      By CIO Review

    • Unlocking the Benefits of Business Intelligence for Success
      Unlocking the Benefits of Business Intelligence for Success

      By CIO Review

    • The Path to Sustainable Agriculture Through Collaboration and Innovation
      The Path to Sustainable Agriculture Through Collaboration and Innovation

      By Anna Pierce, Director of Sustainability at Tate & Lyle

    • AWS Cloud Migration Challenges
      AWS Cloud Migration Challenges

      By CIO Review

    • ERP Migration Pitfalls - Considerations to Guarantee Success
      ERP Migration Pitfalls - Considerations to Guarantee Success

      By Enrique Leon, AI Enterprise Architect, American Sugar Refining

    • Navigating the Complexities of Sap Migrations in the Automotive Industry
      Navigating the Complexities of Sap Migrations in the Automotive Industry

      By Guiomar López García, Global SAP Director, ADLER PELZER GROUP

    • Navigating the Evolving World of Wine and Hospitality
      Navigating the Evolving World of Wine and Hospitality

      By Dave Gerardu, Wine Director, Happy Corner Hospitality Group

    Copyright © 2025 CIOReview. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy Policy       |       Disclaimer