Vendor risk management: A guide for IT leaders (free PDF)

Adopting the right vendor risk management process can go a long way toward guarding against third-party data breaches. This ebook looks at current VRM technology and what to consider when choosing a VRM platform.

From the ebook:

Vendor risk management (VRM) is not a new concept. My article 5 best practices for reducing third-party vendor security risks looks at several ways to mitigate the risk of data breaches caused by third-party vendors. However, in that article, I was remiss in not defining VRM. Here’s an excerpt of the definition from Gartner’s IT Glossary:

“Vendor risk management (VRM) is the process of ensuring that the use of service providers and IT suppliers does not create an unacceptable potential for business disruption or a negative impact on business performance.”

Cybercriminals’ favorite attack vector
Third-party vendor (TPV)-initiated data breaches are becoming the go-to attack vector for cybercriminals. Ponemon Institute’s third annual (2018) Data Risk in the Third-Party Ecosystem report adds credence to this information:

“Fifty-nine percent of respondents confirm that their organizations experienced a data breach caused by one of their third parties and 42 percent of respondents say they had such a data breach in the past 12 months.”

The best practices mentioned in my previous article still apply today, but cybersecurity pros now have much more experience, and they have additional thoughts about TPV security, in particular ideas on how to use VRM to curtail that avenue of attack.

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday

Resource Details

TechRepublic logo
Provided by:
TechRepublic
Topic:
Security
Format:
PDF
CLOSE

Create a TechRepublic Account

Get the web's best business technology news, tutorials, reviews, trends, and analysis—in your inbox. Let's start with the basics.

Already registered? Sign In
  • Include at least 6 characters
  • Include at least 1 lower case character
  • Include at least 1 upper case character
  • Include at least 1 digit
  • Include at least 1 special character
  • Do not include any spaces

* - indicates required fields

CLOSE

Sign in to TechRepublic

Not a member? Create an account

Lost your password? Request a new password

CLOSE

Reset Password

Please enter your email adress. You will receive an email message with instructions on how to reset your password.

Back to login
1 Finish Profile
2 Newsletter Preferences
CLOSE

Welcome. Tell us a little bit about you.

This will help us provide you with customized content.

No thanks, continue without
1 Finish Profile
2 Newsletter Preferences
CLOSE

Want to receive more TechRepublic news?

Newsletter Name
Subscribe
Daily Tech Insider
Daily Tech Insider AU
TechRepublic UK
TechRepublic News and Special Offers
TechRepublic News and Special Offers International
Executive Briefing
Innovation Insider
Project Management Insider
Microsoft Weekly
Cloud Insider
Data Insider
Developer Insider
TechRepublic Premium
Apple Weekly
Cybersecurity Insider
Google Weekly
Toggle All
No thanks, continue without

You're All Set

Thanks for signing up! Keep an eye out for a confirmation email from our team. To ensure any newsletters you subscribed to hit your inbox, make sure to add newsletters@nl.technologyadvice.com to your contacts list.

Back to Home Page

Subscribe to the Cybersecurity Insider Newsletter

Strengthen your organization's IT security defenses by keeping abreast of the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday