How Continuous Third Party Monitoring Can Improve Information Security

Nick Gagalis | February 25, 2015 | tag: Vendor Risk Management

As cyber attacks via third parties become more commonplace, IT decision makers have put the spotlight on the cyber security of their vendors. According to data from a commissioned study, conducted by Forrester Consulting on behalf of BitSight, IT departments among enterprises in the US, UK, France and Germany allocated 21% of their overall IT spending to third parties. That equates to over $270 billion annually in the US alone. That study details the desires of IT professionals and the abilities they would like to have to manage cyber risk and conduct third party monitoring.

Point-in-time, subjective questionnaires are not sufficient for compliance with the new regulations requiring continuous monitoring of vendors, partners and other third parties. (The New York Department of Financial Services has frequently led the way on cybersecurity standards.)

It can be difficult to manage so many different partnerships, especially for companies with hundreds or thousands of vendors. Those considerations have forced IT decision makers to look for data-driven, automated solutions that can scale security performance management.

Current Tools Aren’t Enough to Effectively Manage Third Party Cyber Risks

While IT professionals acknowledge that they want to continuously manage the cyber risks in their network, the solutions they currently use don’t give them that privilege. According to the study, only 23% of organizations formally track threat intelligence practices monthly or more.

The following graph shares which types of supplier-related risks IT professionals are most interested in tracking and managing. Almost two-thirds of surveyed professionals would like to have more data about the risk of losing critical company data and/or the threat of cyberattacks.

IT Seeks The Ability To Track Supplier Risk Metrics

The chart below shares the percentage of survey participants that believe continuous monitoring can help in the areas listed. More than half of the respondents think continuous third party monitoring will make it easier to identify and remediate threats, compare security postures of various companies and track industry trends.

Continuous Monitoring Is Seen As Beneficial To Critical Metrics


What other interesting data came out of the study?

Join us for a webinar on Thursday, February 26 at 11:30am EST to learn how continuous third party monitoring can help your company manage and mitigate cyber risks across your extended enterprise. During the discussion between Stephen Boyer and guest speaker, Forrester Research Senior Analyst Renee Murphy, you will learn:

  • Which industries stand to benefit most from using automated, objective information security data

  • Other findings from the study and their importance in the cybersecurity landscape

  • Specific use cases of continuous security monitoring  helping companies improve information security performance.

Reserve your spot now.

Suggested Posts

BitSight Integrates With ServiceNow to Reduce Risk Throughout Vendor Management Programs

Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring...


5 Best Practices for Conducting Cyber Security Assessments

Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.


5 Tips to Improve Cyber Security Monitoring of Your Vendors

What’s the biggest struggle your vendor risk managers face when establishing cyber security monitoring processes? From sudden increases in the use of third-parties by your organization, to not knowing which vendors might be impacted by...


Get the Weekly Cybersecurity Newsletter.