Create incident response plans. Your company should work with suppliers and partners that have the greatest access to your systems and data to document steps to take during and after a cyber incident, including communications and reporting protocols and identifying stakeholders.
Identify, track and govern your most valuable data. Your company should create systems and policies that help identify who is using critical data, such as intellectual property and customer information, and set controls that protect data in transit, in use and in storage.
Measure third-party risks. Your company should undertake a full risk assessment associated with third parties and identify those that could present the most serious threat to your company’s data or reputation in the event of a cyber incident.
Evaluate third-party security standards. Conduct assessments of your most important partners and service providers and the security controls they provide for your company’s assets. These evaluations should also consider any data privacy regulations or other compliance considerations.
Bind security protocols to contracts. Be proactive in building security requirements into supplier contracts and service level agreements, including protocols for reporting potential security incidents and remedial steps third parties are obligated to initiate in the event of an actualized cyberthreat.
Maintain oversight of third-party security. Cybersecurity requires continuous monitoring and updates to tool sets and protocols as needed. Build performance reviews and key performance indicators into your company’s most important third-party contracts. Stress collaboration during the review process to frame cybersecurity as a shared objective.
Refer to industry best practices and intelligence when reassessing third-party risk. The threat landscape is constantly evolving. Risk profiles of key third parties should be regularly evaluated and adjusted based on new data about existing or emerging threats. Your company should reevaluate third-party risk assessments whenever it changes its own security protocols or learns about new cyberthreats.