Blog

What types of third-party risks need to be managed?

Not all third-party risks are the same, and your management program needs to address them all

Katrina Dalao
Sr. Content Marketing Specialist, CIPM
June 29, 2023

Two colleagues discuss a work project with their mobile phone.

The moment your organization starts working with a third party, it exposes itself to risk. The key is to understand the type of risk posed by every third-party relationship and put the appropriate safeguards in place.

When it comes to third-party risk management (TPRM), organizations typically look at cybersecurity or InfoSec risks. However, there are many more risks that come when working with third parties.  

This article — the second in our series on building a TPRM program — looks at all the types of risks a third party can pose to your organization. We also spoke with six InfoSec and third-party risk leaders from OneTrust and Fortune Global 500 companies about the third-party risk domains to be aware of, and risks that go beyond third parties. 

Download our InfoSec's guide to Third-Party Risk Management, which covers all the steps in setting up a TPRM program, from planning to monitoring and reporting.   

 

What are third party risks? 

Third-party risks are potential risks taken on when an organization engages an external party to provide products or services on their behalf. External parties can include contractors, partners, service providers, suppliers, vendors, or other third parties.  

While an organization has its own security standards, there’s no guarantee that third parties have the same measures in place. With every third party that has access to internal company systems or sensitive data, there’s an increase in the organization’s exposure to potential risks and threats.

“Third-party risk is not just the risk of sharing data or integrating various systems. Those are very important risks to be aware of, but there's also compliance and payment risks, the core financial health of the vendor — all of these other risks that are not just part of security,” says Ruo Xie, VP of Source to Pay at OneTrust. 

 

What are types of third-party risks?  

As the use of third parties continues to increase, so do the types of risks they pose to organizations. The exact type of risk exposure differs for every organization, depending on what third-party service is being rendered. 

For example, say your organization engages a third party to provide online customer support services. If the third party doesn’t maintain up-to-date business continuity or recovery plans, it will be unable to provide the contracted services in cases of data breaches, cyberattacks, outages, natural disasters, or other unexpected circumstances. All these, in turn, become types of third-party risks for your organization — namely, operational, financial, and reputational. 

Here are seven common third-party risks to be aware of:  

 

Cybersecurity or InfoSec risk

Cybersecurity or InfoSec risks arise when an organization’s data can be breached, compromised, exposed, or lost due to deficiencies in a third party’s security controls. This is more likely to occur when service providers have access to an organization’s internal systems or sensitive data, which highlights the importance of conducting third-party due diligence and continuous monitoring. 

 

Operational risk 

Operational risk is created when a third party fails to deliver the expected product or service, causing a disruption in the organization’s routine operations. Regardless of the reason for failure (i.e., cyberattacks, natural disasters, human error), this risk should be addressed in the contract or service-level agreement (SLA). An organization may also opt to have a backup vendor as part of its own business continuity plan.

 

Financial risk

Financial risk occurs when a third party’s financial health negatively impacts your own organization’s finances. For example, if a third party lacks funding or resources, it may start to deliver subpar services and products. This leads to disappointed customers and lost sales. Other forms of financial risks include incurred fines and compensation or remediation costs. To mitigate this risk, identify the third parties that have the most impact on your financial performance and audit their operations on a regular basis. 

 

Compliance and legal risk

Compliance and legal risks are posed to organizations that have to comply with governing regulations (i.e., GDPR, HIPAA), but engage with third parties that may not adhere to the same standards. If there’s a failure to prove regulatory compliance, or worse, an actual cyberattack or data breach occurs, the organization is responsible for any violations. Before entering a third-party relationship, ask for relevant certifications and include compliance requirements in your contract.  

 

Strategic risk

Strategic risk is present when a third party prevents an organization from meeting its strategic objectives. While it depends on the specific objective, this risk can usually be mitigated through better alignment and communication with the third party. Start the engagement by establishing the objectives of both parties, as well as the key metrics that will be used to track performance. 

 

Geopolitical risk

Geopolitical risk is the risk a vendor poses based on their location or the location where the service is conducted. This is becoming an increasing risk, as countries continue to evolve their legal and regulatory standards and it can be near-impossible to predict another country’s economic or political stability. To mitigate geopolitical risk as much as possible, take stock of the number of regulations relevant to the specific third party. Also consider the area’s historical and macro factors — have there been recent political shifts, supply chain disruptions, and the like?  

 

Reputational risk

Reputational risk comes when actions taken by a third party can potentially damage your organization's reputation. It may be a publicized data breach, lawsuit, or negative public opinion about company practices — in most cases, customers will associate any news about third parties with your organization. While you can’t foresee every possible risk to your reputation, conducting thorough third-party assessments and due diligence can help protect your organization’s reputation.  

"There’s also ethical risk, which may not be the CISO’s main concern in the beginning but is something to keep in mind. A venture capitalist or partner, for example, may require you to only do business with ethical companies,” says Jose Costa, Sr. Director of GRC Labs at OneTrust. “And of course, there’s the risk of breaching your customer’s trust, which may be the most important one because it’s very hard to fix.” 

 

Securing your entire supply chain 

Not only do you assume risks from your third parties, there are also similar risks from their third parties (referred to as fourth parties or subcontractors) that can disrupt your organization. 

“You have to think all the way up and down the chain. You could have the 500 partners you do business with, but then they could have thousands on top of that they do business with,” says Mullen. “That's where the whole supply chain attack comes in.”

A recent survey reveals that the financial impact of third-party or subcontractor risk incidents has at least doubled over the last five years. Despite that, only 20% of organizations effectively monitor their subcontractors. This is due to several factors: Organizations lack information about their subcontractors and associated risks, they lack resources, they assume their third parties are already monitoring subcontractors. 

This gap in the third-party ecosystem presents a significant opportunity. By increasing visibility across the entire supply chain, an organization can better understand and manage critical subcontractor risks. 

“At the end of the day, you have to understand that even if it's a third party that does something wrong, it’s your data. You're the one who’s ultimately responsible and will be in the media answering questions,” says Costa.  

Reduce risk, build trust, and enhance business resilience by unifying third-party management across privacy, security, ethics, and ESG. Book a demo today.


You may also like

Webinar

Ethics Program Management

Ethics Exchange: Risk assessments

Join our risk assessments experts as we discuss best practices, program templates, and how provide an assessment that provides the best value for your organization.

October 25, 2023

Learn more

Webinar

Third-Party Risk

5 Ways to save time when assessing third parties for privacy and security risks webinar

Join our webinar and learn how to save time and streamline third-party risk assessment throughout the TPRM lifecycle.

October 25, 2023

Learn more

Webinar

Third-Party Risk

Live Demo EMEA: How OneTrust can help advance your third-party risk management program

Join us for a live demo of OneTrust's third-party risk management solution and see how it can help automate and streamline your TPRM program.

September 19, 2023

Learn more