Software

Gain a 360-degree view of third-party risk by using our SaaS software to centralize, track, automate, assess and report on your vendors. 

Managed Services

Let us handle the manual labor of third-party risk management by collaborating with our experts to reduce the workload and mature your program. 

Overview
Document Collection
Policy/Program Template/Consulting
Virtual Vendor Management Office
Vendor Site Audit

Ongoing Monitoring

Let us handle the manual labor of third-party risk management by collaborating with our experts.

VX LP Sequence USE FOR CORPORATE SITE-thumb
Venminder Exchange

As Venminder completes assessments for clients on new vendors, they are then made available inside the Venminder Exchange for you to preview scores and purchase as you need.

CREATE FREE ACCOUNT

Use Cases

Learn more on how customers are using Venminder to transform their third-party risk management programs. 

Industries

Venminder is used by organizations of all sizes in all industries to mitigate vendor risk and streamline processes

Why Venminder

We focus on the needs of our customers by working closely and creating a collaborative partnership

1.7.2020-what-is-a-third-party-risk-assessment-FEATURED
Sample Vendor Risk Assessments

Venminder experts complete 30,000 vendor risk assessments annually. Download samples to see how outsourcing to Venminder can reduce your workload.

DOWNLOAD SAMPLES

Resources

Trends, best practices and insights to keep you current in your knowledge of third-party risk.

Webinars

Earn CPE credit and stay current on the latest best practices and trends in third-party risk management.  

See Upcoming Webinars

On-Demand Webinars

 

Community

Join a free community dedicated to third-party risk professionals where you can network with your peers. 

Weekly Newsletter

Receive the popular Third Party Thursday newsletter into your inbox every Thursday with the latest and greatest updates.

Subscribe

 

Venminder Samples

Download samples of Venminder's vendor risk assessments and see how we can help reduce the workload. 

resources-whitepaper-state-of-third-party-risk-management-2023
State of Third-Party Risk Management 2023!

Venminder's seventh annual whitepaper provides insight from a variety of surveyed individuals into how organizations manage third-party risk today.

DOWNLOAD NOW

How to Successfully Navigate Vendor Risks in Higher Education

6 min read
Featured Image

Like many other industries facing significant economic challenges, colleges and universities have turned to third-party vendors to manage overall operating expenses and reduce overheads. These vendors often perform critical operations and provide key services for students, faculty, and staff. However, they can also create additional financial burdens and strain a higher education institution’s resources.

For instance, a university that suffers a third-party data breach could face added expenses through legal fees, regulatory fines, and increased insurance premiums. Recovering from a data breach can also require a significant investment of time and resources through investigative work, security testing, and notifying students and faculty of a breach.

A vendor’s full value can only be realized if its inherent risks, such as cybersecurity, financial, and operational, are managed through the practice known as vendor risk management (VRM). Let’s take a look at some of the other ways unmanaged vendor risk can impact a higher education institution. You’ll also learn how the vendor risk management lifecycle can mitigate these risks and help protect your institution’s resources.

The Impact of Vendor Risks in Higher Education 

After several high-profile cyberattacks through the years, like the MOVEit breach in 2023, it’s common for colleges and universities to focus on the financial costs of cybersecurity incidents. However, it’s also important to consider other ways that vendor risk can negatively impact a higher ed institution’s resources.

Here are a few examples:

  • Operational disruptions – A service outage from a technology vendor, like an online learning platform, payroll processer, or library management system, would create significant operational disruptions at a higher education institution. These disruptions can require a lot of time to resolve and redirect IT staff from other priorities. It can also delay or even halt student learning and classes.
  • Decreased productivity – Faculty and staff often rely on technology vendors to create more efficiencies, such as automating tasks and tracking important data in a student management platform. Technology vendors that are performing poorly and don’t meet their contractual service level agreements (SLAs) can decrease productivity and require a shift to manual processes.
  • Reputational damage – Many vendors in higher education are procured for student needs, such as housing, food services and supplies, online learning, and health services. These vendors are representative of the college or university and can cause significant reputational damage by providing poor quality service or maintaining unethical business practices. Rebuilding a damaged reputation and attracting prospective students requires additional time and resources that may not always be available.
  • Noncompliance – Vendors that have access to sensitive data can create compliance issues for a higher education institution by violating privacy laws and regulations. Noncompliance can also be an issue if a vendor’s business practices don’t align with an institution’s internal policies, mission, or values. 

    For example, a university’s commitment to sustainability could be at risk if a vendor doesn’t have a policy in place to address similar issues. Resolving compliance issues and sourcing new vendors can mean that other projects related to innovation and research can’t be prioritized.  

how successfully navigate vendor risks higher education

Using the Vendor Risk Management Lifecycle in Higher Education

The vendor risk management lifecycle is designed to identify, assess, and manage inherent vendor risks that can cause the negative impacts mentioned above. This is achieved through various activities across three stages – onboarding, ongoing, and offboarding. By using the lifecycle, higher education institutions can adopt a strategy to manage vendor risks effectively. 

third-party risk management lifecycle

Here’s a closer look at each stage and examples of how their activities mitigate vendor risk at higher education institutions:

  • Onboarding involves planning & risk assessments, due diligence, and contracting: 
    • Planning & risk assessments – One of the first steps in planning the vendor relationship is to determine how you’ll exit the relationship, which can prevent a lot of unexpected costs and resources further down the line. An exit strategy might be switching to another vendor, bringing the product or service in-house, or discontinuing the activity altogether. In addition to planning, it’s important to establish a risk assessment process. To help higher education institutions assess vendor security risks, the Higher Education Information Security Council (HEISC) developed a Higher Education Community Vendor Assessment Toolkit (HECVAT). This is a questionnaire framework specifically designed for higher education institutions to measure information security risks for vendors who access, process, transmit, or store data. However, institutions should consider using this alongside other tools, such as the Standard Information Gathering (SIG) questionnaire, to identify all other inherent risks in a product or service. Risk assessments should determine two elements – whether the vendor is critical to your operations, and the overall risk rating, which is often measured on a scale of low, moderate, or high.
    • Due diligence – This process involves collecting and validating vendor information such as SOC reports, business continuity and disaster recovery plans, and financial statements. Due diligence helps ensure controls are in place to mitigate vendor risks that can create negative impacts like operational disruptions and noncompliance.
    • Contracting – Negotiating and signing the vendor contract is a significant onboarding activity that will protect a higher education institution from vendor risk. Vendor contracts may include provisions around data security, SLAs, and more, which will ensure the vendor understands the institution’s expectations around performance standards, service quality, and required security practices.
  • Ongoing includes risk re-assessments, risk monitoring and performance management, contract renewals, and periodic due diligence:
    • Risk re-assessments – A vendor’s risk can change for various reasons, such as the decision to procure a new product or service, an update to the vendor’s processes, or a recent security incident. It’s essential to perform regular risk re-assessments to validate that nothing has changed in the vendor relationship. Critical and high-risk vendors should be re-assessed annually, and moderate-risk vendors can be re-assessed every 18 months to two years. Low-risk vendors can be re-assessed every two to three years or upon contract renewal.
    • Risk monitoring and performance management – These activities help ensure the vendor’s risk level and performance remain consistent throughout the contract term. Ongoing monitoring will keep a higher education institution informed of any changes that occur in between formal risk re-assessments, such as declining performance or a new cybersecurity threat that can impact your vendor.
    • Contract renewalsPlanning your contract renewal in advance can help avoid unexpected costs associated with automatic renewals and price increases. Whether your institution decides to negotiate for better terms, or begin looking for an alternative vendor, it’s important to establish a contract management strategy that includes sufficient time for the renewal period.
    • Periodic due diligence – In addition to risk re-assessments, it’s important to perform periodic due diligence throughout the vendor relationship. This means reviewing the vendor’s information on file to make sure you have the most current documents. Business continuity plans, insurance certificates, and SOC reports aren’t valid indefinitely and should be collected before they expire.
  • Offboarding will involve termination, exit plan execution, and third-party risk management (TPRM) closure:
    • Termination – Implementing a termination process that includes formally notifying your vendor and following the contract terms can help keep a higher education institution aware of fees or penalties they may be subject to pay. 
    • Exit plan execution – The established exit strategy is executed through a step-by-step exit plan, which outlines both parties’ responsibilities for ending the relationship. An exit plan should also contain contingency plans if the vendor fails to meet their obligations, which can create additional costs for your institution.
    • TPRM closure – Formally closing the vendor relationship within your internal systems, such as accounts payable, contract management, and procurement, will help ensure final invoices are paid, and automatic payments are suspended.

By implementing and maintaining these comprehensive vendor risk management practices, higher education institutions can identify, assess, and manage vendor risks more effectively, which ultimately delivers more value from outsourcing. Colleges and universities are now outsourcing many of the functions previously considered core to their mission. Despite the importance of cybersecurity as a cornerstone of vendor risk management, institutions should also consider a robust vendor risk management program designed to identify and manage vendor risk in all its forms.

Subscribe to Venminder

Get expert insights straight to your inbox.

Ready to Get Started?

Schedule a personalized solution demonstration to see if Venminder is a fit for you.

Request a Demo