How to Gain a Better Understanding of Vendor Risk

3rd Party Risk Management,
Governance & Risk Management,
Video

Experts Advocate for Routine Vendor Risk Assessments Rather Than One-Time Evaluations


Lance Mueller, President of The Digital Trust Ecosystem, and Mohammad Barakat, Co-Chair of the ACFCS MENA Chapter

As the complexity of vendor ecosystems increases, many organizations still manage third-party risk primarily during the onboarding process. While initial assessments often rely on comprehensive questionnaires to gauge vendor risk, companies frequently neglect to monitor how these risk profiles evolve post-engagement.

Related Reading: Merging Without Mayhem: PAM Strategies that Work

“Organizations need to shift from sporadic reviews to continuous oversight,” asserted Lance Mueller, President of The Digital Trust Ecosystem. “A one-time assessment is insufficient; the threat landscape continuously evolves, vendor operations can change, and new risks can emerge mid-contract. The gaps in monitoring between vendor onboarding and offboarding pose significant risks to organizations.”

Mohammad Barakat, Co-Chair of the ACFCS MENA Chapter, emphasized the operational challenges of maintaining ongoing assessments without overwhelming either vendors or internal teams. “Organizations should utilize automation and integration,” Barakat explained. “By implementing tools that mesh with existing vendor platforms, organizations can streamline risk data collection and analysis, thus reducing the manual workload and ensuring current risk profiles without excessive vendor communication.”

In a recent video conversation with Information Security Media Group, Mueller and Barakat addressed several critical topics, including key indicators to watch during vendor onboarding, how international conflicts and trade disruptions are altering vendor risk exposures, and strategies to discover fraudulent activities post-onboarding.

Barakat brings a wealth of experience advising financial entities, regulatory bodies, and regional governments on anti-money laundering and counter-terrorism financing frameworks, governance structures, and cyber resilience across sectors like banking, telecommunications, and international development, successfully bridging the gap between regulatory requirements and operational realities.

Mueller collaborates with thousands of organizations to accurately communicate their cybersecurity programs. He has substantial expertise in managing third-party and vendor risks and is well-positioned to guide organizations as they navigate the complexities of vendor management in today’s threat landscape.

Source link