SlideShare a Scribd company logo
2
Most read
5
Most read
23
Most read
ARTICLE
AUTHOR: DAVID VINCENT
THIRD-PARTY
RISK MANAGEMENT
ⓒ Corporater. All rights reserved.
What Is Third-Party Risk
Management?
Third-Party Risk Management (TPRM) is
the process of analyzing and controlling
risks presented to your organization by
outsourcing to third-party service providers
(TPSP). On average organizations spend
$10M+ responding to third-party security
breaches each year. However, information
security is not the only area impacted. TPSP
relationships can introduce strategic, financial,
operational, regulatory, and reputational risks.
1 ⓒ Corporater. All rights reserved.
For example, some TPSPs are involved
in the storage, processing, and/or
transmission of cardholder data (CHD),
while others are involved in securing
cardholder data, or securing the
cardholder data environment (CDE).
Point-of-sale companies (or
integrators/resellers) are involved with
the installation, maintenance, monitoring,
or otherwise, support of their systems.
2 ⓒ Corporater. All rights reserved.
Digital relationships with third-party
providers increase opportunities for growth,
but they also increase opportunities for
cyberattacks — a recent study found that
61% of U.S. companies said they had
experienced a data breach caused by one of
their third-party providers (up 12% since
2016) (i)
.
3 ⓒ Corporater. All rights reserved.
Traditionally, the TPSP lifecycle incorporates these five phases, which
required effective integration of governance, performance, and
risk management in each step.
Planning Due Diligence
& Selection
Manage
Contracts
Ongoing
Monitoring
Manage
Termination
4 ⓒ Corporater. All rights reserved.
What Is Due Diligence?
Due Diligence is the investigative process
by which TPSPs are reviewed to determine
suitability for a given task before establishing
a relationship for the engagement with an
organization. Organizations can improve the
effectiveness of their due diligence process by
utilizing external intelligence services such as:
BitSight for cybersecurity, Dun & Bradstreet
for financial performance, Refinitiv for financial
crime, Polecat for reputation, and riskmethods
for supply chain resilience information.
5 ⓒ Corporater. All rights reserved.
Additionally, it is very important to understand
that due diligence MUST be an ongoing activity,
including reviewing, monitoring, and
management communication over the entire
TPSP lifecycle.
Monitoring of the TPSP compliance status helps
to provide the organization with assurance and
awareness about whether the provider is
complying with the applicable requirements for
the services provided.
Therefore, the effectiveness of your due diligence
process will directly impact the success of your
TPSP Risk Management program.
6 ⓒ Corporater. All rights reserved.
Five Key TPSP Risk Assessment Objectives For Your
Due Diligence Process
Identify – Understand the specific products and/or services your TPSP provides, determine if
TPSPs will require access to critical business processes and data within your environment, and
review relevant data from external intelligence service providers (e.g., BitSight, Dun & Bradstreet,
LexisNexis, etc.).
Analyze – Quantify the risk to your organization of engaging with the TPSP and assign a security
risk ranking to prioritize the risk exposure of each TPSP relationship.
Respond – Based on your risk analysis, decide if you are willing to engage with the TPSP or not,
and define your risk response plan for each approved TPSP necessary to effectively monitor and
manage the TPSP residual risk exposure against your organization’s acceptable risk tolerance level.
Monitor – Perform TPSP engagement management monitoring through ongoing due diligence
assessments of TPSPs to identify any changes in the initial risk exposure. The creating of effective
risk assessment survey questionnaires is an important step in maintaining an effective due diligence
monitoring process.
Test – Conduct quarterly self-assessments of your end-to-end TPSP Risk Management process
to validate the effectiveness of the controls and identify opportunities to make improvements. Also,
have your Internal Audit department conduct their own independent assessments to validate the
effectiveness of your TPSP Risk Management process.
7 ⓒ Corporater. All rights reserved.
15 Examples of Third-Party Risk Management Leading
Practices
The organization has established a Tone at the Top with Board-level oversight to enable effective
Governance over the TPRM Program.
The TPRM Program has been established following a Third-Party Management Lifecycle, and
effective policies, processes, procedures, guidelines, tools, and templates exist, which have been
communicated to all relevant TPRM members via periodic TPRM training.
The TPRM Program roles and responsibilities have been clearly defined, communicated, and
understood by all members.
An accurate and complete inventory of all providers exists and is updated frequently.
The organization is effectively identifying, analyzing, evaluating, and responding to all engagement
risks and performing appropriate due diligence.
The organization is effectively incorporating risk, compliance, and performance requirements in the
contracts/agreements as KPIs to proactively monitor and measure variances.
The organization is effectively performing periodic risk management actives and continuous control
monitoring to proactively identify and resolve exceptions.
8 ⓒ Corporater. All rights reserved.
1
2
3
4
5
6
7
9 ⓒ Corporater. All rights reserved.
The organization performs continuous monitoring to identify changes and performance variances
with providers.
The organization is effectively determining the need to terminate and off-board or renew.
The effectiveness of the TPRM Program is independently evaluated to identify opportunities to
correct problems and make improvements.
The organization has an effective business contingency plan for interruptions and disasters caused
by vendors, which is periodically tested for operating effectiveness.
A formal self-assessment is performed periodically to evaluate the capability and effectiveness of
the TPRM team's performance and the effectiveness of the mentoring and training program.
The capability and effectiveness of the TPRM Program are independently evaluated to identify
opportunities to correct problems and make improvements.
The organization consolidated all of its TPRM data and functions into one centralized solution to
increase the efficiency, effectiveness, productivity, and transparency across the organization for
managing TPRM.
The organization has established Continuous Controls Monitoring (CCM) to enables organizations
to transition from performing periodic assessments of randomly selected samples from a larger
population to conducting control assessments 24/7/365 for the full populations.
8
9
10
11
12
13
14
15
How to Build an
Effective Risk
Assessment
Questionnaire?
Regarding the risk assessment
questionnaire, organizations
should decide whether they
will be using a standard
assessment questionnaire from
popular sources like PCI-DSS,
HIPAA, GDPR, ISO, NIST, or a
custom questionnaire.
Standard assessment
questionnaires are created
to fit regulations or specific
industry trends to assess
different areas of privacy
or security risk more effectively,
so they are a better starting
point.
However, the need for specific
answers and more control
often results in custom
questionnaires.
Custom questionnaires are
tricky because they force
providers to answer both
standard and custom questions,
which causes more work for
TPSPs that prevent them from
leverage existing answers from
past risk assessments they have
completed.
10 ⓒ Corporater. All rights reserved.
According to a 2018 E&Y study, 72%
of companies use industry-standard
questionnaires or have built their own
by using a standard as a baseline.
There are best practices to use as a
starting point for the high-level items
in the questionnaires.
11 ⓒ Corporater. All rights reserved.
Below are several industry-standard security assessment
methodologies you can start with to gather and build your
questionnaires:
The SANS (System Administration, Networking, and Security Institute) Top 20 Critical
Security Controls — a shortlist of controls developed by security experts based on
practices that are known to be effective in reducing cyber risks.
The NIST (National Institute of Standards and Technology) Framework for Improving
Critical Infrastructure Cybersecurity — combines a variety of cybersecurity standards and
best practices together in one understandable document (ii)
.
Shared Assessments — An organization that develops assessment questionnaires for use
by its members. The members of this organization work together to create and share
third-party risk management assessment guides their organizations are utilizing.
ISO/IEC 27000 – The International Organization for Standardization is an international
standard-setting body composed of representatives from various national standards
organizations. The ISO/IEC 27000 family of standards helps organizations keep
information assets secure.
1
2
3
4
12 ⓒ Corporater. All rights reserved.
9
8
7
6
5 PCI-DSS – The Payment Card Industry Data Security Standard (PCI DSS) is a set of security
standards designed to ensure that ALL companies that accept, process, store, or transmit
credit card information maintain a secure environment. Within their document library, you
can access numerous sources of information to build your questionnaire, such as the Third
Party Security Assurance document.
HIPAA – The Health Insurance Portability and Accountability Act of 1996 was enacted by
the 104th United States Congress and signed by President Bill Clinton in 1996 and requires
the Secretary of the U.S. Department of Health and Human Services (HHS) to develop
regulations protecting the privacy and security of certain health information.
GDPR – The General Data Protection Regulation 2016/679 is a regulation in EU law on data
protection and privacy for all individual citizens of the European Union and the European
Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas.
HITRUST – The Health Information Trust Alliance, is a privately held company located
in Frisco, Texas, United States that, in collaboration with healthcare, technology, and
information security leaders, has established the HITRUST CSF, a comprehensive,
prescriptive, and certifiable framework, that can be used by all organizations that
create, access, store or exchange sensitive and/or regulated data.
OWASP – The Open Web Application Security Project is a global organization that produces
freely available articles, methodologies, documentation, tools, and technologies in the field
of web application security best practices such as their OWASP Top 10 most critical web app
security list.
13 ⓒ Corporater. All rights reserved.
How to Build Effective Risk Assessment
Survey Questionnaires?
Depending upon the Third-Party Risk Management
software you are using, you may or may not have a robust
survey capability within that solution. If you have hundreds
or thousands of TPSPs, you will need to build effective
risk assessment surveys to support your due diligence
process. It will be important for your organization to
understand how to build effective survey questions.
14 ⓒ Corporater. All rights reserved.
Survey Questions
In the article Four Classes of Survey Questions, the
author mentions that survey questions can be broadly
classified into four classes:
Open-ended (free responses),
Closed-ended (static),
Closed-ended (dynamic), and
Task-based (iii)
.
1
2
3
4
15 ⓒ Corporater. All rights reserved.
As illustrated below, you can see that closed-ended questions themselves can be
classified into different types.
When properly written, closed-ended questions are usually straightforward to the
respondents as they typically involve concrete selections.
Open Ended
Closed Ended
(Statistic)
Multiple Choice
(Single Response)
Multiple Choice
(Multiple Response)
Rating Scales
Closed Ended
(Dynamic) Task Based
Adaptive Conjoint
IRT
1 2
16 ⓒ Corporater. All rights reserved.
Rating Scales
After selecting your survey
question type, you will need
to determine which rating
scale to utilize. A rating
scale is a method designed
to elicit information about a
quantitative or a qualitative
attribute.
Rating scales usually involve
asking participants to rate
abstract concepts, such
as satisfaction, ease, or
likelihood to recommend.
The proper selection of a
rating scale can have a big
impact on both responses
and interpretation.
Dynamic questions are
utilized to build smarter
surveys because they enable
the response of one question
to change the remaining
questions that will be
presented.
For example, the first question
in a survey could be a qualifying
question – have you completed
the annual bring your own
device training? The remaining
questions could change
based on the response to
the first question, and prevent
respondents from having to
answer unnecessary questions.
17 ⓒ Corporater. All rights reserved.
There are at least 15 different rating scale options to
choose from (e.g., Linear Numeric Scale, Likert Scale,
Multiple Rating Matrix, Frequency Scales, Forced Ranking
Scale, Paired Comparison Scale, etc.).
The point is there are many rating scales available, and
slight variations can result in different looking results, even
though they are variations on the same scale.*
However, the goal is to help you understand the
importance of conducting your own research and carefully
plan the survey question and rating scale method you wish
to utilize. Then have an independent quality control review
performed before they are utilized. Seek the help of a
professional service provider if necessary.
* It is not the intention of this article to discuss all of the variations of the potential survey questions and
rating scales; that could take an entire chapter.
18 ⓒ Corporater. All rights reserved.
Time spent getting quality TPSP risk assessment
survey questions developed for your due diligence
process should be seen as an investment in your
TPSP Risk Management program; not an expense!
19 ⓒ Corporater. All rights reserved.
References:
(i) Friel, Sean. “Third-Party Risk Management: Keeping Your Healthcare Organization’s Information Safe”. Security Magazine.
September 2019.
(ii) Thomas, Brian. “A Vendor Risk Management Questionnaire Template”. BitSight, September 2019.
(iii) Sauro, Jeff. “4 Classes of Survey Questions”. MeasuringU, September 2018.
AUTHOR
David Vincent
Director of Partnerships, North America,
Corporater
vincent@corporater.com
20 ⓒ Corporater. All rights reserved.
21
Learn More Request Demo
Corporater offers a fully integrated risk management solution to
handle all aspects of your organization (e.g., financial, operational,
technology, performance, compliance, digital, third-party, etc.),
which provides accurate visualizations of your risk exposure within
your business context, and enables proactive identification and
management of risk events before they negatively impact the
success of your organization.
Allow your organization not only to increase the efficiency of your
risk management program but realize significant cost savings each
year to pay for your investment in the Corporater risk management
solution.
ⓒ Corporater. All rights reserved.
NORWAY
Head Quarters
Corporater AS
Hillevågsveien 24
4016 Stavanger
Norway
+47 481 54 000
BRAZIL
Corporater do Brazil Ltda
Rua Vicente Ferreira, 57 – C15
Jaguaré – São Paulo – SP
CEP.: 05330-050
Brazil
+55 11 983553690
GERMANY
Corporater GmbH
Berliner Allee 47
64295 Darmstadt
Germany
+47 469 61 832
INDIA
Corporater Asia Technologies
Purva primus No. 236
5th. Floor Left Wing, OMR
Thoraipakkam
Chennai 97
India
+91 44 6653 1033
UNITED ARAB EMIRATES
Corporater (Branch)
Office 1901, Indigo Icon
Cluster F.Jumeirah Lakes Towers
P. O. Box: 309083
Dubai, UAE
+971 04 4250298
UNITED KINGDOM
Corporater UK Ltd.
6 Bevis Marks
London
EC3A 7BA
United Kingdom
+44 741 913 9071
UNITED STATES
Corporater, Inc.
3001 Knox St Suite 285
Box #29
Dallas, Texas 75205
USA
+1 800 670 8942
ROMANIA
Corporater Perf Mgmt SRL
Riverside Tower - 10th Floor
Splaiul independentei 291-293
Romania
+40 752 027 780
060042 Bucharest
SOUTH AFRICA
Corporater (Pty) Ltd
Autoparks House, Ground Floor
Cnr Cross Road and Park Crescent
Gauteng
South Africa
+27 846 454 718
Glenhazel, 2193
Corporater empowers medium and large
organizations to manage Governance,
Performance, Risk, and Compliance by
providing them with a business management
platform that is highly configurable and
adaptable to their unique business model.
We use our gains to make a social impact.
Contact us for demo at
www.corporater.com/requestdemo
info@corporater.com
© Corporater | All rights reserved..
22

More Related Content

PPTX
Third Party Risk Management
PPTX
Third-Party Risk Management: Implementing a Strategy
PDF
FSI_Third Party Risk Management_Deloitte PoV
PPTX
Third Party Risk Management
PDF
A compliance officer's guide to third party risk management
PDF
Third-party information security assessment checklist.pdf
PPTX
Cybersecurity Capability Maturity Model (C2M2)
PPTX
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Third Party Risk Management
Third-Party Risk Management: Implementing a Strategy
FSI_Third Party Risk Management_Deloitte PoV
Third Party Risk Management
A compliance officer's guide to third party risk management
Third-party information security assessment checklist.pdf
Cybersecurity Capability Maturity Model (C2M2)
Conducting a NIST Cybersecurity Framework (CSF) Assessment

What's hot (20)

PDF
Risk Management for Directors - Governance Institute
PDF
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
PDF
Governance Risk Management and Compliance (GRC)
PPTX
Cybersecurity Metrics: Reporting to BoD
PPTX
What is GRC – Governance, Risk and Compliance
PPTX
Introduction to NIST’s Risk Management Framework (RMF)
PDF
Third-Party Risk Management
PDF
Cybersecurity Roadmap Development for Executives
PDF
ISO 27005 Risk Assessment
PPTX
GRC Fundamentals
PPTX
it grc
PPTX
Information Security Governance and Strategy
PDF
Cyber Security Governance
PDF
Third Party Risk Management Introduction
PPTX
PPT-Security-for-Management.pptx
PPTX
NIST CyberSecurity Framework: An Overview
PDF
Third Party Vendor Risk Managment
PDF
Cybersecurity concepts & Defense best practises
PPT
IT Security management and risk assessment
 
PPTX
Basic introduction to iso27001
Risk Management for Directors - Governance Institute
Why You Should Prioritize Third Party Risk Management (TPRM) in Today's Marke...
Governance Risk Management and Compliance (GRC)
Cybersecurity Metrics: Reporting to BoD
What is GRC – Governance, Risk and Compliance
Introduction to NIST’s Risk Management Framework (RMF)
Third-Party Risk Management
Cybersecurity Roadmap Development for Executives
ISO 27005 Risk Assessment
GRC Fundamentals
it grc
Information Security Governance and Strategy
Cyber Security Governance
Third Party Risk Management Introduction
PPT-Security-for-Management.pptx
NIST CyberSecurity Framework: An Overview
Third Party Vendor Risk Managment
Cybersecurity concepts & Defense best practises
IT Security management and risk assessment
 
Basic introduction to iso27001
Ad

Similar to Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires (20)

PDF
Why does-your-company-need-a-third-party-risk-management-program
PDF
TrustArc Webinar - Mitigating Third-Party Risks: Best Practices for CISOs in ...
PDF
Third party risk management with cyber threat intelligence
PPTX
Information Security Management
PPTX
Third-Party Risk Management Best Practices for Financial Enterprises
PDF
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
PDF
TPRM Made Easy - 4 Dimension TPRM Framework
PDF
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
PDF
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
PPTX
Certified Banking TPM - Module 4 powerpoint presentation
PPTX
Overcoming Hidden Risks in a Shared Security Model
PPTX
Certified Banking TPM - Module 5 powerpoint presentation
PPTX
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
PPTX
Cyber Security Services Risk Management Solutions | Ampcus Inc
PDF
DVV Solutions About Us Datasheet
PDF
Standards in Third Party Risk - DVV Solutions ISACA North May 19
PDF
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
PPTX
Managing Third-Party Risk Effectively
PDF
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
PDF
Third-Party Risk Management at Accenture
Why does-your-company-need-a-third-party-risk-management-program
TrustArc Webinar - Mitigating Third-Party Risks: Best Practices for CISOs in ...
Third party risk management with cyber threat intelligence
Information Security Management
Third-Party Risk Management Best Practices for Financial Enterprises
A Comprehensive Approach To Third Party Risk Management White Paper 20180103
TPRM Made Easy - 4 Dimension TPRM Framework
𝐑𝐢𝐬𝐤 𝐀𝐧𝐚𝐥𝐲𝐬𝐭 𝐈𝐧𝐭𝐞𝐫𝐯𝐢𝐞𝐰 𝐐𝐮𝐞𝐬𝐭𝐢𝐨𝐧𝐬
Questions for a Risk Analyst Interview - Get Ready for Success.pdf
Certified Banking TPM - Module 4 powerpoint presentation
Overcoming Hidden Risks in a Shared Security Model
Certified Banking TPM - Module 5 powerpoint presentation
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
Cyber Security Services Risk Management Solutions | Ampcus Inc
DVV Solutions About Us Datasheet
Standards in Third Party Risk - DVV Solutions ISACA North May 19
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Managing Third-Party Risk Effectively
The State of TPRM in the UK - DVV Solutions Breakfast Briefing March 2019
Third-Party Risk Management at Accenture
Ad

More from Corporater (20)

PDF
Using Technology to Navigate Uncertainty Market Trends in Performance and Ris...
PDF
Enhancing the Three Lines Model with Business-Integrated GRC Technology
PDF
Ensure Preparedness with Operational Resilience - Article
PDF
Quantifying Non-Financial Risk and contextualized Financial Risk is what brin...
PDF
Internal controls of sustainability reporting - Infographic.pdf
PDF
Understanding GPRC
PDF
Capabilities of a Digital Twin.pdf
PDF
Infographic- 3 Phases of Digital Maturity
PDF
Infographic - What is an ISO Compliance Software?
PDF
Key Benefits of IT and Cyber Risk Management Software | Infographics
PDF
[Infographic] Enterprise Risk Management Technology Features – À La Carte
PDF
The Timeline for Operational Resilience Compliance [Infographic]
PDF
Infographic - Business Benefits of Strategy and Performance Management Systems
PDF
Infographic - Critical Capabilities of a Good Risk Management Solution
PDF
Infographic - Five Ways to Optimize CXO Dashboards
PDF
Infographic - Four Key Areas of Technology Support for Performance Management
PDF
The Purpose of Holistic Risk Management
PDF
Corporater Overview | Business Management Platform (BMP)
PDF
Building an Effective AML Program
PDF
Infographic - The History of KPIs
Using Technology to Navigate Uncertainty Market Trends in Performance and Ris...
Enhancing the Three Lines Model with Business-Integrated GRC Technology
Ensure Preparedness with Operational Resilience - Article
Quantifying Non-Financial Risk and contextualized Financial Risk is what brin...
Internal controls of sustainability reporting - Infographic.pdf
Understanding GPRC
Capabilities of a Digital Twin.pdf
Infographic- 3 Phases of Digital Maturity
Infographic - What is an ISO Compliance Software?
Key Benefits of IT and Cyber Risk Management Software | Infographics
[Infographic] Enterprise Risk Management Technology Features – À La Carte
The Timeline for Operational Resilience Compliance [Infographic]
Infographic - Business Benefits of Strategy and Performance Management Systems
Infographic - Critical Capabilities of a Good Risk Management Solution
Infographic - Five Ways to Optimize CXO Dashboards
Infographic - Four Key Areas of Technology Support for Performance Management
The Purpose of Holistic Risk Management
Corporater Overview | Business Management Platform (BMP)
Building an Effective AML Program
Infographic - The History of KPIs

Recently uploaded (20)

PDF
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
PPTX
Materi_Pemrograman_Komputer-Looping.pptx
PPTX
What to Capture When It Breaks: 16 Artifacts That Reveal Root Causes
PDF
System and Network Administraation Chapter 3
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
PPTX
Save Business Costs with CRM Software for Insurance Agents
PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Presentation of Computer CLASS 2 .pptx
PPT
JAVA ppt tutorial basics to learn java programming
PPTX
Mastering-Cybersecurity-The-Crucial-Role-of-Antivirus-Support-Services.pptx
PDF
The Role of Automation and AI in EHS Management for Data Centers.pdf
PDF
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
PDF
System and Network Administration Chapter 2
PDF
top salesforce developer skills in 2025.pdf
PDF
Understanding NFT Marketplace Development_ Trends and Innovations.pdf
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
DOCX
The Five Best AI Cover Tools in 2025.docx
ShowUs: Pharo Stream Deck (ESUG 2025, Gdansk)
Materi_Pemrograman_Komputer-Looping.pptx
What to Capture When It Breaks: 16 Artifacts That Reveal Root Causes
System and Network Administraation Chapter 3
How to Migrate SBCGlobal Email to Yahoo Easily
How Creative Agencies Leverage Project Management Software.pdf
Teaching Reproducibility and Embracing Variability: From Floating-Point Exper...
Save Business Costs with CRM Software for Insurance Agents
PTS Company Brochure 2025 (1).pdf.......
Presentation of Computer CLASS 2 .pptx
JAVA ppt tutorial basics to learn java programming
Mastering-Cybersecurity-The-Crucial-Role-of-Antivirus-Support-Services.pptx
The Role of Automation and AI in EHS Management for Data Centers.pdf
IEEE-CS Tech Predictions, SWEBOK and Quantum Software: Towards Q-SWEBOK
System and Network Administration Chapter 2
top salesforce developer skills in 2025.pdf
Understanding NFT Marketplace Development_ Trends and Innovations.pdf
ManageIQ - Sprint 268 Review - Slide Deck
Upgrade and Innovation Strategies for SAP ERP Customers
The Five Best AI Cover Tools in 2025.docx

Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires

  • 1. ARTICLE AUTHOR: DAVID VINCENT THIRD-PARTY RISK MANAGEMENT ⓒ Corporater. All rights reserved.
  • 2. What Is Third-Party Risk Management? Third-Party Risk Management (TPRM) is the process of analyzing and controlling risks presented to your organization by outsourcing to third-party service providers (TPSP). On average organizations spend $10M+ responding to third-party security breaches each year. However, information security is not the only area impacted. TPSP relationships can introduce strategic, financial, operational, regulatory, and reputational risks. 1 ⓒ Corporater. All rights reserved.
  • 3. For example, some TPSPs are involved in the storage, processing, and/or transmission of cardholder data (CHD), while others are involved in securing cardholder data, or securing the cardholder data environment (CDE). Point-of-sale companies (or integrators/resellers) are involved with the installation, maintenance, monitoring, or otherwise, support of their systems. 2 ⓒ Corporater. All rights reserved.
  • 4. Digital relationships with third-party providers increase opportunities for growth, but they also increase opportunities for cyberattacks — a recent study found that 61% of U.S. companies said they had experienced a data breach caused by one of their third-party providers (up 12% since 2016) (i) . 3 ⓒ Corporater. All rights reserved.
  • 5. Traditionally, the TPSP lifecycle incorporates these five phases, which required effective integration of governance, performance, and risk management in each step. Planning Due Diligence & Selection Manage Contracts Ongoing Monitoring Manage Termination 4 ⓒ Corporater. All rights reserved.
  • 6. What Is Due Diligence? Due Diligence is the investigative process by which TPSPs are reviewed to determine suitability for a given task before establishing a relationship for the engagement with an organization. Organizations can improve the effectiveness of their due diligence process by utilizing external intelligence services such as: BitSight for cybersecurity, Dun & Bradstreet for financial performance, Refinitiv for financial crime, Polecat for reputation, and riskmethods for supply chain resilience information. 5 ⓒ Corporater. All rights reserved.
  • 7. Additionally, it is very important to understand that due diligence MUST be an ongoing activity, including reviewing, monitoring, and management communication over the entire TPSP lifecycle. Monitoring of the TPSP compliance status helps to provide the organization with assurance and awareness about whether the provider is complying with the applicable requirements for the services provided. Therefore, the effectiveness of your due diligence process will directly impact the success of your TPSP Risk Management program. 6 ⓒ Corporater. All rights reserved.
  • 8. Five Key TPSP Risk Assessment Objectives For Your Due Diligence Process Identify – Understand the specific products and/or services your TPSP provides, determine if TPSPs will require access to critical business processes and data within your environment, and review relevant data from external intelligence service providers (e.g., BitSight, Dun & Bradstreet, LexisNexis, etc.). Analyze – Quantify the risk to your organization of engaging with the TPSP and assign a security risk ranking to prioritize the risk exposure of each TPSP relationship. Respond – Based on your risk analysis, decide if you are willing to engage with the TPSP or not, and define your risk response plan for each approved TPSP necessary to effectively monitor and manage the TPSP residual risk exposure against your organization’s acceptable risk tolerance level. Monitor – Perform TPSP engagement management monitoring through ongoing due diligence assessments of TPSPs to identify any changes in the initial risk exposure. The creating of effective risk assessment survey questionnaires is an important step in maintaining an effective due diligence monitoring process. Test – Conduct quarterly self-assessments of your end-to-end TPSP Risk Management process to validate the effectiveness of the controls and identify opportunities to make improvements. Also, have your Internal Audit department conduct their own independent assessments to validate the effectiveness of your TPSP Risk Management process. 7 ⓒ Corporater. All rights reserved.
  • 9. 15 Examples of Third-Party Risk Management Leading Practices The organization has established a Tone at the Top with Board-level oversight to enable effective Governance over the TPRM Program. The TPRM Program has been established following a Third-Party Management Lifecycle, and effective policies, processes, procedures, guidelines, tools, and templates exist, which have been communicated to all relevant TPRM members via periodic TPRM training. The TPRM Program roles and responsibilities have been clearly defined, communicated, and understood by all members. An accurate and complete inventory of all providers exists and is updated frequently. The organization is effectively identifying, analyzing, evaluating, and responding to all engagement risks and performing appropriate due diligence. The organization is effectively incorporating risk, compliance, and performance requirements in the contracts/agreements as KPIs to proactively monitor and measure variances. The organization is effectively performing periodic risk management actives and continuous control monitoring to proactively identify and resolve exceptions. 8 ⓒ Corporater. All rights reserved. 1 2 3 4 5 6 7
  • 10. 9 ⓒ Corporater. All rights reserved. The organization performs continuous monitoring to identify changes and performance variances with providers. The organization is effectively determining the need to terminate and off-board or renew. The effectiveness of the TPRM Program is independently evaluated to identify opportunities to correct problems and make improvements. The organization has an effective business contingency plan for interruptions and disasters caused by vendors, which is periodically tested for operating effectiveness. A formal self-assessment is performed periodically to evaluate the capability and effectiveness of the TPRM team's performance and the effectiveness of the mentoring and training program. The capability and effectiveness of the TPRM Program are independently evaluated to identify opportunities to correct problems and make improvements. The organization consolidated all of its TPRM data and functions into one centralized solution to increase the efficiency, effectiveness, productivity, and transparency across the organization for managing TPRM. The organization has established Continuous Controls Monitoring (CCM) to enables organizations to transition from performing periodic assessments of randomly selected samples from a larger population to conducting control assessments 24/7/365 for the full populations. 8 9 10 11 12 13 14 15
  • 11. How to Build an Effective Risk Assessment Questionnaire? Regarding the risk assessment questionnaire, organizations should decide whether they will be using a standard assessment questionnaire from popular sources like PCI-DSS, HIPAA, GDPR, ISO, NIST, or a custom questionnaire. Standard assessment questionnaires are created to fit regulations or specific industry trends to assess different areas of privacy or security risk more effectively, so they are a better starting point. However, the need for specific answers and more control often results in custom questionnaires. Custom questionnaires are tricky because they force providers to answer both standard and custom questions, which causes more work for TPSPs that prevent them from leverage existing answers from past risk assessments they have completed. 10 ⓒ Corporater. All rights reserved.
  • 12. According to a 2018 E&Y study, 72% of companies use industry-standard questionnaires or have built their own by using a standard as a baseline. There are best practices to use as a starting point for the high-level items in the questionnaires. 11 ⓒ Corporater. All rights reserved.
  • 13. Below are several industry-standard security assessment methodologies you can start with to gather and build your questionnaires: The SANS (System Administration, Networking, and Security Institute) Top 20 Critical Security Controls — a shortlist of controls developed by security experts based on practices that are known to be effective in reducing cyber risks. The NIST (National Institute of Standards and Technology) Framework for Improving Critical Infrastructure Cybersecurity — combines a variety of cybersecurity standards and best practices together in one understandable document (ii) . Shared Assessments — An organization that develops assessment questionnaires for use by its members. The members of this organization work together to create and share third-party risk management assessment guides their organizations are utilizing. ISO/IEC 27000 – The International Organization for Standardization is an international standard-setting body composed of representatives from various national standards organizations. The ISO/IEC 27000 family of standards helps organizations keep information assets secure. 1 2 3 4 12 ⓒ Corporater. All rights reserved.
  • 14. 9 8 7 6 5 PCI-DSS – The Payment Card Industry Data Security Standard (PCI DSS) is a set of security standards designed to ensure that ALL companies that accept, process, store, or transmit credit card information maintain a secure environment. Within their document library, you can access numerous sources of information to build your questionnaire, such as the Third Party Security Assurance document. HIPAA – The Health Insurance Portability and Accountability Act of 1996 was enacted by the 104th United States Congress and signed by President Bill Clinton in 1996 and requires the Secretary of the U.S. Department of Health and Human Services (HHS) to develop regulations protecting the privacy and security of certain health information. GDPR – The General Data Protection Regulation 2016/679 is a regulation in EU law on data protection and privacy for all individual citizens of the European Union and the European Economic Area. It also addresses the transfer of personal data outside the EU and EEA areas. HITRUST – The Health Information Trust Alliance, is a privately held company located in Frisco, Texas, United States that, in collaboration with healthcare, technology, and information security leaders, has established the HITRUST CSF, a comprehensive, prescriptive, and certifiable framework, that can be used by all organizations that create, access, store or exchange sensitive and/or regulated data. OWASP – The Open Web Application Security Project is a global organization that produces freely available articles, methodologies, documentation, tools, and technologies in the field of web application security best practices such as their OWASP Top 10 most critical web app security list. 13 ⓒ Corporater. All rights reserved.
  • 15. How to Build Effective Risk Assessment Survey Questionnaires? Depending upon the Third-Party Risk Management software you are using, you may or may not have a robust survey capability within that solution. If you have hundreds or thousands of TPSPs, you will need to build effective risk assessment surveys to support your due diligence process. It will be important for your organization to understand how to build effective survey questions. 14 ⓒ Corporater. All rights reserved.
  • 16. Survey Questions In the article Four Classes of Survey Questions, the author mentions that survey questions can be broadly classified into four classes: Open-ended (free responses), Closed-ended (static), Closed-ended (dynamic), and Task-based (iii) . 1 2 3 4 15 ⓒ Corporater. All rights reserved.
  • 17. As illustrated below, you can see that closed-ended questions themselves can be classified into different types. When properly written, closed-ended questions are usually straightforward to the respondents as they typically involve concrete selections. Open Ended Closed Ended (Statistic) Multiple Choice (Single Response) Multiple Choice (Multiple Response) Rating Scales Closed Ended (Dynamic) Task Based Adaptive Conjoint IRT 1 2 16 ⓒ Corporater. All rights reserved.
  • 18. Rating Scales After selecting your survey question type, you will need to determine which rating scale to utilize. A rating scale is a method designed to elicit information about a quantitative or a qualitative attribute. Rating scales usually involve asking participants to rate abstract concepts, such as satisfaction, ease, or likelihood to recommend. The proper selection of a rating scale can have a big impact on both responses and interpretation. Dynamic questions are utilized to build smarter surveys because they enable the response of one question to change the remaining questions that will be presented. For example, the first question in a survey could be a qualifying question – have you completed the annual bring your own device training? The remaining questions could change based on the response to the first question, and prevent respondents from having to answer unnecessary questions. 17 ⓒ Corporater. All rights reserved.
  • 19. There are at least 15 different rating scale options to choose from (e.g., Linear Numeric Scale, Likert Scale, Multiple Rating Matrix, Frequency Scales, Forced Ranking Scale, Paired Comparison Scale, etc.). The point is there are many rating scales available, and slight variations can result in different looking results, even though they are variations on the same scale.* However, the goal is to help you understand the importance of conducting your own research and carefully plan the survey question and rating scale method you wish to utilize. Then have an independent quality control review performed before they are utilized. Seek the help of a professional service provider if necessary. * It is not the intention of this article to discuss all of the variations of the potential survey questions and rating scales; that could take an entire chapter. 18 ⓒ Corporater. All rights reserved.
  • 20. Time spent getting quality TPSP risk assessment survey questions developed for your due diligence process should be seen as an investment in your TPSP Risk Management program; not an expense! 19 ⓒ Corporater. All rights reserved.
  • 21. References: (i) Friel, Sean. “Third-Party Risk Management: Keeping Your Healthcare Organization’s Information Safe”. Security Magazine. September 2019. (ii) Thomas, Brian. “A Vendor Risk Management Questionnaire Template”. BitSight, September 2019. (iii) Sauro, Jeff. “4 Classes of Survey Questions”. MeasuringU, September 2018. AUTHOR David Vincent Director of Partnerships, North America, Corporater [email protected] 20 ⓒ Corporater. All rights reserved.
  • 22. 21 Learn More Request Demo Corporater offers a fully integrated risk management solution to handle all aspects of your organization (e.g., financial, operational, technology, performance, compliance, digital, third-party, etc.), which provides accurate visualizations of your risk exposure within your business context, and enables proactive identification and management of risk events before they negatively impact the success of your organization. Allow your organization not only to increase the efficiency of your risk management program but realize significant cost savings each year to pay for your investment in the Corporater risk management solution. ⓒ Corporater. All rights reserved.
  • 23. NORWAY Head Quarters Corporater AS Hillevågsveien 24 4016 Stavanger Norway +47 481 54 000 BRAZIL Corporater do Brazil Ltda Rua Vicente Ferreira, 57 – C15 Jaguaré – São Paulo – SP CEP.: 05330-050 Brazil +55 11 983553690 GERMANY Corporater GmbH Berliner Allee 47 64295 Darmstadt Germany +47 469 61 832 INDIA Corporater Asia Technologies Purva primus No. 236 5th. Floor Left Wing, OMR Thoraipakkam Chennai 97 India +91 44 6653 1033 UNITED ARAB EMIRATES Corporater (Branch) Office 1901, Indigo Icon Cluster F.Jumeirah Lakes Towers P. O. Box: 309083 Dubai, UAE +971 04 4250298 UNITED KINGDOM Corporater UK Ltd. 6 Bevis Marks London EC3A 7BA United Kingdom +44 741 913 9071 UNITED STATES Corporater, Inc. 3001 Knox St Suite 285 Box #29 Dallas, Texas 75205 USA +1 800 670 8942 ROMANIA Corporater Perf Mgmt SRL Riverside Tower - 10th Floor Splaiul independentei 291-293 Romania +40 752 027 780 060042 Bucharest SOUTH AFRICA Corporater (Pty) Ltd Autoparks House, Ground Floor Cnr Cross Road and Park Crescent Gauteng South Africa +27 846 454 718 Glenhazel, 2193 Corporater empowers medium and large organizations to manage Governance, Performance, Risk, and Compliance by providing them with a business management platform that is highly configurable and adaptable to their unique business model. We use our gains to make a social impact. Contact us for demo at www.corporater.com/requestdemo [email protected] © Corporater | All rights reserved.. 22