New survey findings just released show third-party risk trends, insights and challenges for 2020.
DOWNLOAD NOWClients love Venminder because the tools are user friendly and you have an entire firm behind you to manage the everyday risks associated with third parties.
READ STORIESVendor management oversight is now recognized as a unique discipline which you can successfully outsourced.
LEARN MOREVendor risk management, or vendor management as it’s commonly called, or more accurately, third party risk management in recent years, is the process of fully identifying all of the significant companies that aid in the delivery of a product or service to your organization or to your customers on behalf of the organization. It involves controlling costs, driving service excellence and mitigating risk to gain increased value throughout the deal lifecycle.
A third party is a company or entity with whom you have a written agreement to provide a product or service on behalf of your organization to your customer or upon whom you rely for a product or service to maintain daily operations. This is your vendor, or also known as your third party vendor.
A fourth party is your third party vendor’s vendor. It’s one with whom you don’t have a direct contractual relationship.
A vendor risk assessment assists with analyzing new and ongoing vendor relationships in order to gauge the level of risk posed to the organization. A risk assessment evaluates all of the considerations of outsourcing a particular product or service. In essence, your organization is giving up direct control over that product or service and relying on others, so you must understand the risks associated with that decision.
Three reasons include:
First, let's discuss what risk means. There are two divisions of risk:
Rolled up into regulatory risk are numerous categories clearly called out in the guidance (e.g., FDIC FIL 44-2008 and OCC Bulletin 2013-29), including items such as:
After considering these areas and asking your vendor a set of questions, you will deem whether your vendor is low, medium or high risk.
In addition to level of risk, you also need to determine if a vendor is critical or non critical. That means how important the vendor is to the business for daily function. A way to figure that out is to ask three particular questions. Those are:
If the answer to any of these is "Yes," they are a critical third party. If not, they are not considered a critical third party.
A SOC (System and Organization Controls) report is an independent audit report performed by a certified public accountant (CPA). The report attests to the existence, and for audits over a period of time (Type II), the operating effectiveness of controls specified by the company being audited (your vendor, the service entity).
Basically, the report should tell you if your vendor has a good base of controls in place to safeguard your data, and for Type II reports, whether those safeguards are actually working, based on the scope of the audit determined by the vendor.
1. Let’s start with the easiest – if they won’t provide it, document the effort and determine if it’s acceptable.
3. If it’s post-contract, you may have a much more difficult decision. Your best protection at that point may even be to have a call (and document the discussion) with them to see what they can offer as an alternative and what the sticking point is.
4. Get creative – perhaps see if you can have video calls where they would show their financials or business continuity plans but could not record it in any way.
5. Meet the third party to have a meeting to discuss the items they won’t release.
You can’t always get what you want, but you should always ask and document the efforts.
The policy is simply the document that asserts how your company will manage its third parties and the risk associated with outsourcing certain activities. The policy is the foundational document for all third party activities.
The program should build upon each of the key concepts laid out in the policy document and get into more of the “how” and not just the “why”.
A program document is like the owner’s manual for your vehicle. It’s designed to let you get your hands dirty in working on third party risk activities, but not expecting you to be a mechanic (that’s where the Procedures would come in, for the front-line experts).
The program is designed to be instructive to the lines of business and senior management on each area’s role as it pertains to third party risk management.
Determining the inherent risk and the residual risk of
a third party is a key element of doing a robust risk assessment properly.
Inherent Risk
Think of inherent risk as the level of risk you notice when you first walk in the door, virtually or actually. It’s just about your first impression – your first glance at their financial statement, your first walk through of the call center, your first review of their compliance activities – these are, admittedly, based on limited knowledge but they should give you a good leading indicator of where the biggest risks are.
Residual Risk
Residual risk is never higher than inherent risk – if you think it is, then you likely misidentified the inherent risk. The risk when you wander on to the next vendor should never be higher than when you first got there – your impression of the risk should always be equal to or perhaps less than the inherent risk level – otherwise, it’s important for you to go back and determine if you mis-identified the inherent risk or whether the mitigating controls are effective.
A service level agreement – commonly called an SLA – is a key component of every contractual relationship with your third parties.
"An SLA is “an agreement that sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems and the metrics by which the effectiveness of the process is monitored and approved.” Gartner
The SLA should be developed between your two
companies – the institution and the third party.
Ideally, it will be tailored to the products and services the third party is providing.
Centralized: All responsibility for vendor management rests with a single team, typically the compliance officer or the third party risk management team.
Decentralized: Various lines of business select and work with the vendor directly. This means that vendor risk or compliance may set the rules but rely entirely upon the front-line management to execute.
Hybrid: The vendor management office sets the guidelines and checks the results while working closely with the business units. This model proves particularly effective in larger organizations.
Venminder has a vast library of complimentary educational content for you to dive in deep into the world of third party risk management.