Vendor Risk Management

How Continuous Third Party Monitoring Can Improve Information Security

Nick Gagalis | February 25, 2015

As cyber attacks via third parties become more commonplace, IT decision makers have put the spotlight on the cyber security of their vendors. According to data from a commissioned study, conducted by Forrester Consulting on behalf of BitSight, IT departments among enterprises in the US, UK, France and Germany allocated 21% of their overall IT spending to third parties. That equates to over $270 billion annually in the US alone. That study details the desires of IT professionals and the abilities they would like to have to manage cyber risk.

Point-in-time, subjective questionnaires are not sufficient for compliance with the new regulations requiring continuous monitoring of vendors, partners and other third parties. (The New York Department of Financial Services has frequently led the way on cybersecurity standards.)

It can be difficult to manage so many different partnerships, especially for companies with hundreds or thousands of vendors. Those considerations have forced IT decision makers to look for data-driven, automated solutions that can scale security performance management.

Current Tools Aren’t Enough to Effectively Manage Third Party Cyber Risks

While IT professionals acknowledge that they want to continuously manage the cyber risks in their network, the solutions they currently use don’t give them that privilege. According to the study, only 23% of organizations formally track threat intelligence practices monthly or more.

The following graph shares which types of supplier-related risks IT professionals are most interested in tracking and managing. Almost two-thirds of surveyed professionals would like to have more data about the risk of losing critical company data and/or the threat of cyberattacks.

IT Seeks The Ability To Track Supplier Risk Metrics

The chart below shares the percentage of survey participants that believe continuous monitoring can help in the areas listed. More than half of the respondents think continuous monitoring will make it easier to identify and remediate threats, compare security postures of various companies and track industry trends.

Continuous Monitoring Is Seen As Beneficial To Critical Metrics

 

What other interesting data came out of the study?

Join us for a webinar on Thursday, February 26 at 11:30am EST to learn how continuous third party monitoring can help your company manage and mitigate cyber risks across your extended enterprise. During the discussion between Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy, you will learn:

  • Which industries stand to benefit most from using automated, objective information security data

  • Other findings from the study and their importance in the cybersecurity landscape

  • Specific use cases of continuous monitoring  helping companies improve information security performance.

Reserve your spot now.

Suggested Posts

Third-Party Risk Management Best Practices for Enterprise

Companies are becoming increasingly reliant on third-party relationships, and cyber attacks originating in the systems of third parties are on the rise.

READ MORE »

Airbus Incident Shines Spotlight on Third-Party Vendor Security Risks

2019 has been a year of high-profile attacks, and, as we predicted, it’s only getting worse. That’s certainly the case for Airbus.

READ MORE »

A Vendor Risk Management Questionnaire Template

IT Risk Assessment Questions for Third Parties

Digital relationships with third-party vendors increase opportunities for growth, but they also increase opportunities for cyberattacks — a recent study found that 61% of U.S. companies said...

READ MORE »

Subscribe to get security news and updates in your inbox.