You are on page 1of 15

Transforming your

third-party risk
into a competitive
advantage
Contents Welcome
Welcome................................................................. 2 In today’s connected, digital and highly Further, the expectation from shareholders and regulators is that
competitive world, third-party partnerships offer boards must know exactly what the company is doing across the globe,
Executive summary.................................................. 4
companies the opportunity for greater agility by which third parties are acting on its behalf and what they are authorized
Questions to consider in
Six steps to building your TPRM capability.................. 10 reducing production or delivery time, while also to do. Organizations are increasingly exposed, should any inappropriate addressing third-party risk
1. Instill oversight and governance........................... 12 lowering costs. And companies are seizing that or criminal behavior take place that jeopardizes the interests of the
2. Get a full view of your third-party inventory........... 14 opportunity. organization and its stakeholders. How does your organization
3. Establish a risk approach and models.................... 17
4. Implement policies and standards........................ 18
5. Establish and execute TPRM processes................ 20
However, while these ecosystems offer incredible
opportunities for organizations to provide
Given its highly regulated environment, the financial services industry
has been at the forefront of third-party risk management (TPRM). For 1 delegate ownership and
accountability of third-
party risks?
exceptional customer experiences and drive the last five years, EY has conducted an annual survey of financial
6. Leverage technology, automation and reporting.... 22 profitable growth, they also open the door to a services third-party risk professionals to gauge their evolving maturity
Our survey methodology.......................................... 24 host of new risks. in managing the increasing third-party risks. This year, EY decided to
look beyond financial services and toward other industries that need Does your organization have

2
Contacts................................................................. 25
Organizations that will be successful in this new to introduce or substantively improve their TPRM capabilities. The a comprehensive catalog of
transformative age are ones that successfully results of the global organizations we surveyed suggest that many your third parties and third-
create value from risk across their business and organizations are taking meaningful steps to get ahead of third-party
party risks?
value chain – upside, downside and outside risks. threats. Yet, for the most part, TPRM remains in its infancy for
Third-party partnerships are an example of taking these organizations.
an upside risk to deliver strategic value while also
being responsible for protecting against downside In the pages that follow, we explore how organizations can improve their Is your organization able
risks and monitoring outside risks introduced by a TPRM posture by taking stock of their current governance structure, to differentiate among

3 third parties based on


related entity. identifying and inventorying third-party risk, developing an approach for
assessing risk, testing and improving the policies and procedures they risk to determine further
In the last several years, media headlines have have in place, and making certain they have the right capabilities and
actions needed to remain
been filled with revelations of cyber-attacks and procedures in place to measure and report their progress.
security breaches, regulatory fines, legal actions
protected?
against top-level executives and reputational
damage caused by third-party vulnerabilities.
These revelations have shocked senior executives
Vignesh Veerasamy Is third-party risk

4
Global and Americas Advisory TPRM
and consumers alike. And they’ve prompted
+1 415 894 8708
management integrated
boards and audit committees to pay closer
vignesh.veerasamy@ey.com with your third-party
attention. Members of the Audit Committee management policies?
Leadership Network (ACLN) met in New York
to discuss the current state of third-‐party risk Amy Brachio
management. Their conversation, captured in Global and Americas Advisory Risk
an ACLN Viewpoints article, underscores the
Does the organization
+1 612 371 8537
have the appropriate
5
escalating importance of third-party risk and the amy.brachio@ey.com
need to manage it. infrastructure and
capabilities to effectively
Organizations may be able to outsource Nitin Bhatt manage and mitigate risks?
responsibilities for various functions, but not the Global Advisory RIsk Transformation
accountability. CXOs and boards are ultimately +91 806 727 5127
accountable for the actions of third parties. nitin.bhatt@in.ey.com

2 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 3
•• Suppliers •• Business associates
Third •• Contractors •• Consultants
Executive summary pa •• Joint ventures
•• Service providers
•• Vendors
•• First tier,

rt
ies
The escalating need for TPRM Third-party risk management •• Brokers downstream and
provides a function for management •• Agendas related entities

At an annual innovation retreat speed of digital evolution. The pace to identify, evaluate, monitor and
hosted by EY, panel participants of change in today’s environment manage the risks associated with Third-party risk
third parties and contracts. management
•• General contract for services
discussed the ingredients necessary will mandate risk communities and •• Statement of work
for disruptive innovation. Specifically, ecosystem sharing to stay current •• Leases

s
tra

ct
they argued that the status quo was and embrace disruption to achieve a
on •• Business associate agreements
C •• Master service agreement
not only obsolete, it was a recipe for competitive advantage in the market.
disaster. Organizations have to design Suppliers, contractors, joint ventures,
Figure 1: What is TPRM
ecosystems that bring the outside in service providers, brokers, agents
while maintaining trust and confidence and consultants are some of the third
with key stakeholders. More recently, parties with whom organizations are Third parties pose numerous risks
in EY’s latest semi annual Capital forming relationships and building
There are several types of risks that For example, third parties may does an organization manage business
Confidence Barometer, nearly consortiums.
organizations using third parties have a significant impact to an continuity and resiliency risk when
one in five organizations surveyed
need to consider, including strategic, organization’s operational risks if a third parties are providing the parts
indicate that they are looking at joint As the need for third-party
operational, financial, political, third party provides a critical product and supplies necessary to operate
ventures and alliances to provide both partnerships grow, so too do the risks.
regulatory, digital, cyber and privacy, or service to the organization. What business-as-usual? What happens
immediate tailwinds and the tools to However, the risks lie not only in the
resiliency, and reputational. The level happens if a third party is unable to if a third party fails to adhere to
achieve long-term strategic growth. relationships themselves, but also in
of exposure to these upside, downside perform according to their service regulatory and legal requirements and
the contracts that bind them together.
and outside risks is based on how level agreement due to a disruption in is subject to severe legal penalties and
These trends suggest that third- And organizations are responsible for
organizations are using the third service or a defect in their production fines?
party collaboration is not only here managing them.
parties. line? If a natural disaster occurs, how
to stay: it’s set to accelerate with the

Risks associated with third parties

Geopolitical risk Reputational risk Financial risk


Risk of doing business in a specific
Risk that the organization’s brand Risk that the third party cannot
country and includes legal/
and reputation is impacted should continue to operate as a financially
regulatory, political and social
an event occur at the third party viable entity
economic considerations

Regulatory and Cyber and privacy risk


compliance risk Digital risk Risk that an organization’s data
Risk that a third party fails to Risk that is associated with the is lost or security is compromised
comply with a required regulation, third parties’ digital business due to deficiencies in the cyber
thus causing the organization to processes security and privacy controls of
be out of compliance the third pary

Operational risk Business continuity and


Risk that a third party fails to Strategic risk
meet the organizational needs Risk that the organization’s and
resiliency risk
from a service/product delivery third-party strategic objective are Risk of third-party failure on the
perspective due to deficiencies in misaligned continuation of business as usual
the third-parties operations for the organization

Figure 2: Risks associated with third parties

4 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 5
Addressing third-party risk EY’s TPRM survey shows health care, media and entertainment, and future challenges. For additional
technology, power and utilities, details on the survey methodology,
To address the associated risks third varying levels of maturity
diversified industrial products, and please refer to page 24.
parties pose, organizations need in managing the risks government and public sector.
to have a robust TPRM capability EY conducted a survey of more than Our findings revealed varying levels
in place that is building in trust by 100 organizations around the globe Survey topics included program of maturity among respondents,
design. Figure 3 represents the six and across a variety of industries, to structure, third-party inventory, depending on their size and how long
foundational components that allow better understand how organizations inherent risk assessments, third-party their TPRM capabilities have been
organizations to design and implement manage risk introduced by third risk assessments, risk questionnaires, in place. However, overall, most
an efficient and consistent TPRM parties. The industries include, but are fourth parties, issue management and respondents are well behind those
capability. Without a consistent and not limited to, the following: consumer escalation, reporting and technology, with leading-class TPRM capabilities.
comprehensive TPRM framework, products and retail, life sciences, cybersecurity and threat intelligence,
organizations risk reputational
damage, incomplete monitoring efforts
and increased costs. TPRM foundational components

Technology,
TPRM provides a better understanding Governance & Third-party Risk approach Policies & TPRM
automation &
oversignt inventory and models standards processes
of third-party relationships by tracking reporting
the metrics related to third parties’
controls, performance and activities.
By effectively managing third parties
on an ongoing basis, organizations can Provides direction Enables Establishes that Establishes Establishes standard Increases efficiency,
for stakeholders understanding of monitoring activities clear roles and and scalable reduces overal cost
evaluate whether the risks outweigh the in the creation third-party landscape are reflective of the responsibilities processes to evaluate of TPRM function and
costs of doing business with third parties. and execution of automating inherent and residual for all functional and monitor third- enables continuous
of the program third-party risk risk assessment owners through the party risk levels and monitoring of
and oversees the management assiciated to execution of the control compliance third-party risks
function to confirm processes third parties and end-to-end TPRM life and compliance.
it is operating as their services and cycle. More mature Additionally, the
designed are essential in fuctions embed use of technology
quantification and service and risk increases data
illustration of the management within integrity and provides
TPRM program value the overarching seamless and reliable
third-party reporting
management policy
and procedures for
Third-party risk seamless integration
management

Oversight and Third-party Risk approach Policies and TPRM Technology,


governance inventory and models standards processes automation
and reporting
Key

Level 5: Enhanced Level 4: Operational Level 3: Established Level 2: Planning Level 1: Initial

Maturity level of leading class TPRM capabilities Maturity level of survey respondents Increasing maturity

Figure 3: TPRM foundational components Figure 4: TPRM foundational components

6 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 7
TPRM survey highlights

42%
of respondents manage their TPRM function
through a centralized, enterprise-wide
TPRM office, with either compliance (22%),
information security (21%) or procurement
(17%) having primary ownership.

Adoption of technology
to support TPRM is
still in its infancy; most
respondents have not
yet adopted third-party
provider tools and
technology to support

52% say that their TPRM function has been in place


TPRM.
three years or less.

Respondents’ biggest
challenges include a
lack of technology,
decentralization of
responsibilities and

20%
of the respondents surveyed have third- budget or funding.
party populations of 5,000 or more, with
procurement predominantly having primary
ownership for these relationships.

30% of organizations experienced a breach caused


by a third party within the past two years.

8 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 9
Six steps
to building
your TPRM 1 Instill oversight and
governance.
2 Get a full view of your
third-party inventory.
Identify, categorize and assess
Establish a robust governance
capability
your existing third-party
structure with engagement population to effectively manage
from the board and C-Suite so your third-party inventory.
To address the associated that sound risk management
risks third parties pose, practices are embedded into the
organizations need to have organization’s culture. Set the tone
a robust TPRM capability in at the top.
place that is building in trust
by design — one that identifies
third-party relationship owners
and guides these owners in
how to effectively manage and
maintain the risk. Ideally, TPRM
activities should be embedded
into every phase of the third-
3 Establish a risk
approach and models.
Adopt risk models according to
4 Implement policies and
standards.
party management life cycle. These should outline the
your organization’s risk appetite purpose and phases of the TPRM
Specifically, organizations will
and culture. Determine the level framework and define the roles
want to consider undertaking
of risk your organization is willing and responsibilities of accountable
the following actions:
to take. stakeholders.

5 Establish and execute


TPRM processes.
These should be cascaded into
6 Harness emerging
technology to improve
risk mitigation
each phase of the third-party risk outcomes.
management life cycle. Harness emerging technology to
improve risk mitigation outcomes.
Use technology to automate
processes, analyze data and report
metrics to improve decision-
making and understand the
operational effectiveness of the
TPRM function.

10 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 11
1. Instill oversight and governance
42%
For TPRM to be truly effective, place three years or less. Most of Employees responsible for the first Board-level involvement is critical for of respondents operate under a centralized TPRM
organizations must have the right these organizations have opted to line of defense own the third-party stakeholder buy-in. Unfortunately, structure and from an enterprise-wide TPRM office.
governance and oversight in place. A establish their TPRM capability with a business relationship and day-to-day third-party risk is not yet on
governance model helps to improve centralized structure. Approximately oversight. They are relied upon to the board’s agenda within most
transparency into and accountability 45% of respondents whose function identify, measure, monitor and report organizations. Only 22% of survey
for TPRM and makes certain that it is three years or older use a hybrid risks generated by business third- respondents report breaches to their
operates as designed. approach, with the business area party relationships. board while 55% report breaches to

TPRM governance defines the vision


becoming increasingly involved in
supporting more centralized TPRM The second line of defense team
senior management.
52% of respondents say that their TPRM function has been
operational for three years or less.
of the organization’s TPRM capability activities. A centralized structure designs and owns the third-party
and provides direction for the risk management framework. They
execution. The operating model for
decreases redundancies and
can be managed holistically. In a provide independent, risk-based
“We
“ have full
day-to-day functioning should include decentralized structure, the onus is viewpoint and guide the first line of support from the
22%
organizational structure, committees, defense in risk responsibilities.
and roles and responsibilities for
on the individual business units for
managing the risk. This can lead to
board and senior of respondents report breaches to their board.

managing third parties. In addition, the an inconsistent use of standards and Those responsible for the third line management. We
governance approach should consider of defense independently assess
how TPRM activities integrate with
duplication of resources and work.
adherence to the TPRM framework
have a dedicated
other risk management functions. The number of full-time resources and provide assurance that the third- meeting with the
dedicated to TPRM capabilities party risk management process is
can vary based on the size of the functioning as designed.
senior management
Assign ownership for TPRM
There is no widespread consistency
organization. For example, 40% of team every month Future trends:
respondents with fewer than 100,000 The board is ultimately accountable
in assigning ownership for third-party
employees have between one and for third parties and their issues and
to review all third- 1. Third-party risks will get more board-level attention. Organizations
typically provide third-party risk reports to senior management. However,
risk management responsibilities.
five full-time resources in their TPRM risk. Organizations with leading-class party risks and how relatively few escalate issues to the board level. As more organizations
According to the results of our
function. However, the number of TPRM capabilities also set up a TPRM
survey, primary ownership of the
dedicated TPRM resources climbs oversight committee that reports up
they are being dealt realize that board-level involvement is an important factor in the success
of TPRM, they will feature it on the board agenda.
TPRM function typically falls within
dramatically for respondents with to the board. with or mitigated.
compliance or information security
more than 100,000 employees, with 2. Sector-based alliances and consortiums will continue to transform
functions. As TPRM capabilities
56% reporting having more than 25
We have also the TPRM function. Sector-based consortiums and alliances provide
Involve key stakeholders to
mature, other functions such as
people supporting the function. improve success tried to educate repeatable third-party risk management capabilities that multiple
procurement, enterprise risk and legal
participating organizations within a sector can use. Consortiums seek to
are integrated. Organizations should identify critical at least the audit more effectively mitigate third-party risk, while reducing the overall cost
Establish a governance structure stakeholders and appropriately
Organizations can use a centralized, engage with them to enhance ongoing
committee. And and burden on the industry and third parties. Sector-based consortiums are
To establish an effective oversight and
currently and will continue to transform the TPRM function. Nearly half of
decentralized or hybrid structure to governance structure, organizations TPRM success. Organizations will as we’ve educated the respondents we surveyed indicate they are looking to gain efficiencies
manage their TPRM capabilities. The also want to seek support from
structure tends to vary depending on
should look at their TPRM framework
business unit leaders as champions
them, they’ve been by joining an industry alliance or consortium.
in the context of the three lines of
the organization culture, operating defense. A clearly defined three-lines- to drive adoption. TPRM activities fully supportive.”
model and maturity of the function. need to build relationships, increase
of-defense model helps the TPRM
awareness and integrate third-party — EMEIA, Power and Utilities
capability to operate effectively in
For more than half of respondents, risk management practices into day-
monitoring and reducing risk.
the TPRM function has been in to-day business processes.

12 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 13
2. Get a full view of your third-
party inventory
A surprising number of organizations is large and growing. One in five of Collect relevant risk information The most effective TPRM approach
do not have a full view of their third- survey respondents have third-party In a mature organization, a third-party will have direct inputs from risk
party inventory. Organizations have populations of 5,000 or more. inventory goes beyond a master list management, compliance and
inventories that are incomplete, of vendors containing basic purchase- business units to maintain a real-time
At the most basic level, organizations
spread across multiple systems to-pay data. A mature inventory and robust third-party inventory.
initially segment their inventory by
and departments, and lack a single offers a view of the risks each
new and existing third parties. These
source of truth. However, before vendor brings to the organization.
organizations can look to effectively two groups should be managed and
This type of inventory includes “Understanding
“ what
assessed differently. After this initial
manage their third-party risks, they
segmentation, organizations should
dynamic information, such as service risks your third
first need to identify their third parties description details, date service
and the respective third-party owners, take a more detailed look into their
started, spend information, third-party parties pose to your
populations by grouping vendors by
and categorize their vendor inventory.
other more specific criteria, such as
contract or agreement, accountable organization is half
relationship owners and executives
Identify third parties and their
criticality, service type and cost, and
from the contracting organization, a the battle, but first
business units that receive the third-
relationship owners
party services. Once they’ve collected
list of vendor representatives, sub- you must ensure
For organizations that do not have an vendors (or fourth parties), and a
inventory and are trying to build one
the risk information, organizations
summary of key risks associated with your inventory is
should categorize third parties based on
reactively, they can leverage existing
level of risk. This will drive downstream
each third party. accurate.”
third-party data that groups such as
risk management activities.
procurement, compliance, legal or Maintain a real-time third-party — North America, Health care
existing business units maintain. Using inventory
invoice or payment data, contract Who owns the third-party
The third-party inventory needs to
inventory?
management databases, or enterprise be maintained as it is constantly
resource planning (ERP) systems changing, with third parties being Future
28%
trend:
can provide the foundation for this Procurement
added and removed or services
inventory. Although many organizations expanding and reducing. Maintaining
do not have one system that an accurate and complete third-party Business intelligence will drive
contains this data, they can still build Compliance 13% operational change and improve
inventory can serve as the foundation
connections and relationships among for automating third-party risk decision-making. Organizations
the different systems to feed into a management processes. Organizations are increasingly using third-party
Line of business 12% risk data, predictive modeling,
single inventory management system. will want to review the inventory on
an ongoing basis for new, terminated, statistics and visualization to
inactive and rogue vendors (“rogue” generate insights that help
Categorize vendors
meaning where businesses engage procurement and supply chain
Not all third parties are the same;
the vendor outside of the contracting make better decisions. Data
segmentation allows organizations to
protocol) and compare this to the gathered from TPRM activities
prioritize their efforts and ultimately
third-party invoice data. can also be used to provide third-

57%
how vendors should be managed from of respondents include
party risk intelligence that drives
a risk perspective. This is especially risk information as part
of their inventory. operational change and reduce
true when the number of third parties
risks throughout the vendor
life cycle.

14 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 15
3. Establish a risk approach and models
Based on the organization’s risk

59%
of respondents have three or fewer risk tiers. Among
appetite, organizations should
respondents that have had a TPRM function in place for
determine the risks that are relevant
more than five years, 87% use three or more risk tiers.
and the models to use. These risks
should align with the organization’s
risk identification strategies and
enterprise risk management
(ERM) program. 24% of third-party risks are classified as critical or
highest risk.

As organizations develop a clear view


of their third-party landscape through
a robust inventory, it is important to “Organizations
“ that methodically identify, assess
differentiate among third parties based and respond to external risks that have the
on risk and understand what further
actions organizations may need to potential to impact their business strategy are
take to remain protected. Mature better equipped to define risk responses that
organizations have an established risk
universe (geopolitical, reputational, reduce the negative impact of the risk while
financial, regulatory and compliance, helping maximize the organization’s potential.”
cyber and privacy, operational,
strategic, digital, business continuity — Insights on governance, risk and compliance: External risks, EY
and resiliency) that helps to identify
which risks should be used to evaluate
third-party relationships and the level
of risk that the organization is willing
to take. These organizations feed Future trend:
risk information collected about third Organizations will need to consider a broader range of upside, downside
parties into risk models that allow and outside risks and break down the organizational silos. In an
them to qualitatively and quantitatively increasingly digital and technology-driven world, it is vital for organizations
assess the risks, and focus their to understand and react to information security and privacy risks. Survey
efforts on monitoring and managing results indicate that 68% of respondents are already collecting information
higher levels of third-party risk. The on the data and systems access held by their third parties. Further, 52% of
risk models also help to classify third- respondents say that their information security function is involved in the
parties based on defined levels of risk design/maintenance of the inherent risk assessment process. However,
(e.g., low, medium, high, critical). as third-party risk management continues to evolve, the most mature and
Organizations should categorize risk-savvy organizations will expand their focus beyond information security
third parties based on the level of and regulatory compliance and aim to cover a broader, more inclusive set
risk in their third-party inventory. of risk factors. Most importantly, the interconnected nature of risk across
A third party’s ranking within an the enterprise means that TPRM cannot function in a silo. Organizations
organization’s risk model drives will be better served aligning their enterprise risk management, TPRM,
the monitoring activities that cybersecurity and other risk-related functions and capabilities to provide
organizations perform. a holistic view on risk.

16 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 17
4. Implement policies and standards
Policies and standards establish be responsible for enforcing the approach, provide definitions of
clear roles and responsibilities and requirements stated in the policies and third parties and related key terms,
expectations for all stakeholders standards and driving accountability define key roles and responsibilities,
involved in an organization’s TPRM for key stakeholders. outline the TPRM framework, describe
initiatives, internally and externally. all phases of the TPRM life cycle,
It is critical for all internal stakeholders
And yet, according to our survey, document the system(s) of record
to understand their responsibilities
70% of respondents cite some level used to manage the third party and
when engaging a third party, the risks
of difficulty in formally establishing explain the escalation protocols for
associated with doing business with an
policies, procedures and guidelines, non-compliant stakeholders or third-
external party and the consequences
and maintaining consistent compliance party issues. Policies and standards
of not complying with the
with the policies that are in place. should be reviewed and approved by
organization’s policies and standards the executive management team on
Policies and standards are not to achieve effective TPRM execution. an annual basis at minimum.
sufficient without the support
TPRM policies and standards must
of executive management. The
clearly state the TPRM purpose and
executive management team should

“Organizations
“ need policies and
procedures to set the standards
and guidelines for managing third-
party risks across the enterprise.
Without it, you cannot expect
of respondents cite some level of difficulty resources to understand their roles
70% and responsibilities when it comes
in formally establishing policies, procedures
and guidelines, and maintaining consistent
compliance with the policies that are in place. to managing third parties.”
— North America, Health care

18 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 19
5. Establish and execute TPRM processes
For policies to have their biggest Implementing an industry standard process, sourcing performs an inherent should perform a close-out assessment assessments. Residual risk assesses
No. of questions included in the
impact, organizations should have in framework is a good start, but it’s risk assessment to understand the risks to understand the level of risk exposure a third party’s controls and mitigating
inherent risk assessment questionnaire
place a risk management framework not enough to build a comprehensive associated with the third parties. the third party’s termination poses to factors. When effective, controls
that guides third-party relationship TPRM capability. The chosen framework the organization. Policies, procedures typically reduce the overall level of Less than 20 questions 42%
TPRM activities primarily occur
owners to more effectively manage the needs to be adjusted and enhanced and standards should outline the key inherent risk associated with a third
during the due diligence, onboarding 26-40 questions 35%
relationships and their underlying risks. based on the organization’s industry, TPRM activities so that the process party’s products and services. A lower
and monitoring phases, where the
competencies, mission and TPRM vision. is communicated and implemented residual risk may decrease the level of More than 41 questions 23%
As shown in the graphic below, an organization selects and onboards the across the organization. monitoring activities required, even
effective third-party risk management Most organizations focus on risk third party after understanding the risks when the product or service risk is
process follows a continuous life cycle management activities during the of managing the vendor. Key activities Method typically used to conduct a
Examine inherent third-party risk inherently high.
for all relationships and incorporates due diligence and monitoring phases. in these phases include an inherent risk third-party risk assessment for critical
the following phases. The following However, organizations need to assessment, residual risk assessment Inherent risks are the risks associated Organizations can perform residual and highest risk?
framework aligns foundational risk embed TPRM activities across the and risk response management. with providing a product or service risk assessments using an in-depth Critical
elements throughout the third-party third-party risk management life regardless of the controls and questionnaire, on-site visits or phone 37% 40% 11% 4%
This process is not only for new third mitigating factors a third-party may
risk management life cycle. Industry cycle. More mature functions embed meetings. For the most critically rated
parties, as existing vendors must also Highest risk
standard frameworks such as those service and risk management within have in place. third parties, 37% of respondents say
22% 60% 12% 3%
undergo risk assessments to identify
published by the International the overarching vendor management their organization elects to perform
their risk rating and be included in Organizations typically evaluate
Standards Organization (ISO) and policy and procedures for seamless their third-party risk assessments On-site assessment
the monitoring phase according to inherent risks using risk assessments
National Institute of Standards integration and streamlined execution. on-site. Only 22% conduct on-site Remote assessment - full scope
the level of risk. Organizations should to determine where each service falls
and Technology (NIST) can help assessments for third parties that Remote assessment - reduced scope
Sourcing begins the third-party risk apply a consistent approach to monitor on the organization’s third-party risk
organizations build their initial are rated lower than critical. For risks N/A - assessments not performed
management process by working vendors and escalate issues and risks spectrum. Inherent risk data often
framework by adopting a globally that are highest but not critical, 60%
with stakeholders to define business to the appropriate oversight and includes a view of critical risk factors
accepted risk management structure of respondents say their organization
and methodology. requirements and kick off the bidding governance groups. If an organization such as product and service location,
conducts a full-scope remote “Siloed” approaches
process for third parties. During this needs to terminate a third party, it relevant regulations, financial,
operational and reputational impact
assessment, an increasing trend that to third-party
uses fewer resources and results in a
Oversight and governance
(e.g., HIPAA, PCI DSS, GDPR, UK’s
Cyber Essentials), as well as sub-
similar level of assessment quality. risk management
vendor (fourth party) involvement, usually lead to
business continuity, data and systems
Sourcing Due diligence Contracting Onboarding Monitoring Termination access, and access methods. Using
More than 40% of respondents contract governance
this information, a risk model can surveyed use ISO or NIST
gaps, overlapping
• Define business • Verify regulatory • Negotiation • Onboarding of third • Risk management • Executing exit
determine the third party’s overall as a baseline, and 21% use
requirements
• Create business case
and compliance
requirements
• Establishment of
contract terms and
party
• Transition of services
assessment and
monitoring
strategy
• Exposure/close out inherent risk standing. To calculate a proprietary framework to monitoring
• Project approval
• Perform risk
assessments
SLAs
• Review of contract
to third party
• Document exit
• Service management
• Contract risk
risk assessment
• Return of data/
this inherent risk rating, organizations develop their questionnaires. programs and
• Identify potential develop questionnaires to assess the
Key activities

third party
• Evaluate third-party
responses
terms and SLA
• Contract approval,
strategy (as
applicable)
review
• Issue management
equipment
• Legal confirmation risk that the third party would pose to increased execution
• Conduct inherent Once organizations have identified
risk assessment
• Existing third-party
identification
legal review and
signature
• Establishment of
monitoring cycle:
• Risk treatment
(acceptance)
of data destruction the organization.
and assessed the risks, they need costs.
• RFx initiation
• Third-party • Third-party record • Risk management
• Action planning
to put the building blocks in place — Third-party risk management:
• Identify relationship recommendation management
• Service Look for residual risk to manage them. Organizations can
owners • Monitoring of issue moving from a complince
• Third-party selection management Based on the inherent risk rating,
remediation and work with the third parties to accept, obligation to a source of
risk treatment
organizations can then conduct remediate or mitigate these risks. competitive advantage, EY
Policy, procedures and standards varying levels of residual risk
Note: Third-Party Risk Management aspects displayed in bold. Highlighted areas are where most clients engage EY. Figure 5: TPRM key activities

20 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 21
6. Harness emerging technology to
improve risk mitigation outcomes
In today’s technology-driven world, Choose the right third-party Increase efficiency Report results
TPRM capabilities need to include technology Robotic Process Automation (RPA) is Organizations can use real-time “Technology
“ has
technology tools that can automate Overall, organizations are looking Abilily of respondents to report on
processes and analyze the data TPRM for TPRM technology that offers
introducing high-impact innovations reporting to provide timely updates to allowed us to the following aspects of their TPRM
into the TPRM industry that allow the business, senior management and
activities generate. Many companies improved cost efficiencies and organizations to significantly decrease the board. Some of the more mature streamline the program
still use Excel spreadsheets and scalability to meet a growing third-
manual processes to maintain and party population. The technology also
process time while increasing volume organizations are able to break process, digitize Population of critical third parties
of assessments. RPA can then down their third-party inventory by
report their third-party inventory and needs to integrate seamlessly with further help streamline operations by reporting common risk themes within information to 34% 26% 32% 8%

TPRM process. Organizations are other organizational systems and have


using on-premises and Software as an intuitive and user-friendly design
eliminating manual tasks, repetitive the third-party community and service help organizations Risk treatment monitoring
activities and process bottlenecks. type. This information allows mature
a Service (SaaS) solutions, although and interface. Although there is no Organizations can then focus their time organizations to provide details to make informed 28% 22% 29% 21%

more organizations are leaning toward overriding favorite system when it


the latter. SaaS solutions are more comes to technology tools, 12% report
building their third-party risk inventory procurement and contracting so that business decisions Third-party risk scorecard/profile across all
to include all types of risks, such as they can identify these risks at applicable risk and performance domains
efficient and cost-effective. using SAP and 13% elect to go with information security, geopolitical, contract initiation. and more efficiently 15% 21% 36% 28%
their own proprietary tool. financial, regulatory and reputation.
Currently, only 34% of respondents link to external Easy on-demand

Archer
say they have on-demand reporting data sources and Within 1 week
Archer on Process for critical third parties; only 28%
providers.”
Functions VRM SAP/Ariba Oracle Bwise Hyperos Prevalent Propriety None > one week
Premises Unity
Cloud can report on their risk treatment Unable to report
distribution in the same way. — EMEIA, Health care
Sourcing activity 4% 0% 24% 11% 0% 1% 0% 0% 12% 48%
The next step for organizations
will be to leverage technology for
Inherent risk predictive modeling (i.e., indicating
assessment 1% 1% 4% 1% 2% 5% 4% 1% 13% 68%
areas of emerging risk), real-time
statistics that will allow management Future trend:
to focus budgets in the right areas, A tectonic technology shift will move TPRM from manual to automatic.
Contract
repository 0% 0% 18% 6% 0% 0% 0% 0% 16% 60% and visualization to provide leadership As the TPRM industry follows the accelerating digital wave from on-premises
with simple intuitive graphics for technologies to cloud-based and Software-as-a-Service (SaaS) platforms,
insightful and effective decision- manual processes and spreadsheets will give way to automation and analytics.
Primary third-
party inventory 5% 0% 12% 7% 0% 1% 1% 0% 13% 61% making. Organizations that invest in The benefits of automation and real-time analytics include cost reduction,
technology for real-time reporting and increase in productivity, high availability and reliability, and performance
automation will be one step ahead of growth. These benefits far outweigh the cost of acquiring these technologies —
Third-party risk
assessment 6% 1% 2% 0% 0% 2% 4% 0% 13% 72% organizations that continue to rely an opportunity that organizations are seeing and seizing.
facilitation tool on manual activities. The following
figure displays what capabilities
Issue or risk
organizations have today for reporting
response 7% 2% 4% 0% 1% 1% 4% 0% 13% 68%
management tool third-party risks.

22 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 23
Our survey methodology Contacts
EY conducted a survey of 101 Vignesh Veerasamy
Respondent profile
organizations around the globe and Global and Americas Advisory TPRM
across a variety of industries, each Total 101 +1 415 894 8708
with a function to manage third-party # of vignesh.veerasamy@ey.com
By industry %
risk. The industries include, but are respondents
not limited to, the following: consumer Consumer products and retail 19 19% Netta Nyholm
products and retail, life sciences,
Technology 17 17% EMEIA TPRM
health care, media and entertainment, +49 221 2779 16427
technology, power and utilities, Life sciences 11 11% netta.nyholm@de.ey.com
diversified industrial products, and
Health care 9 9%
government and public sector.
Media and entertainment 9 9% Charlie Offer
In this survey, we asked participants Asia-Pacific TPRM
Telecommunications 6 6%
to respond to questions within several +61 3 9288 8104
key areas of their respective Third- Power and utilities 5 5% charlie.offer@au.ey.com
Party Risk Management (TPRM)
Diviersified industrial products 5 5%
programs. Topics included program
Government and public sector 3 3% Harald deRopp
structure, third-party inventory,
Japan TPRM
inherent risk assessments, third-party Other* 17 17% +81 3 3503 1110
risk assessments, risk questionnaires, harald.deropp@jp.ey.com
By region
fourth parties, issue management and
escalation, reporting and technology, North America 72 72%
cybersecurity and threat intelligence, Matthew Moog
Europe, Middle East, India & Africa (EMEIA) 23 23%
and future challenges. Global and Americas Financial Services TPRM
South America 4 4% +1 201 551 5030
To gather more in-depth insights matthew.moog@ey.com
Asia Pacific (APAC) 2 2%
and examples, we conducted follow-
up interviews with select participants By organization size
Amy Brachio
covering topics, such as drivers for Fewer than 24,999 63 62% Global and Americas Advisory Risk
success, operating models, board
25,000 to 50,000 16 16% +1 612 371 8537
involvement, use of technology amy.brachio@ey.com
and planned investments in their 50,001 to 100,000 13 13%
TPRM programs.
More than 100,000 9 9% Nitin Bhatt
We extend a personal note of thanks to Global Advisory RIsk Transformation
* Industries such as oil and gas, HR services, mining and metals, automotive, logistics, chemical, and
our survey participants for taking the +91 806 727 5127
real estate. Hospitality and construction were grouped as Other due to insufficient sample size. On
time to share their experiences. some charts and graphs, numbers may not add to 100% due to rounding. nitin.bhatt@in.ey.com

24 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 25
Notes

26 | Transforming your third-party risk into a competitive advantage Transforming your third-party risk into a competitive advantage | 27
EY | Assurance | Tax | Transactions | Advisory

About EY
EY is a global leader in assurance, tax, transaction and advisory
services. The insights and quality services we deliver help build
trust and confidence in the capital markets and in economies the
world over. We develop outstanding leaders who team to deliver
on our promises to all of our stakeholders. In so doing, we play a
critical role in building a better working world for our people, for
our clients and for our communities.

EY refers to the global organization, and may refer to one or


more, of the member firms of Ernst & Young Global Limited, each
of which is a separate legal entity. Ernst & Young Global Limited,
a UK company limited by guarantee, does not provide services to
clients. For more information about our organization, please
visit ey.com.

© 2018 EYGM Limited.


All Rights Reserved.

EYG no. XXXXXXXXX

1805-2676748

ED None
This material has been prepared for general informational purposes only and is
not intended to be relied upon as accounting, tax or other professional advice.
Please refer to your advisors for specific advice.

ey.com

You might also like