SlideShare a Scribd company logo
1 of 19
Implementing an
Effective Third Party
Risk Management
Program
Who am I? Jerod Brennen
InfoSec Geek
Security Architect, GBQ Partners
Alphabet Soup: CISSP, GWAPT, GWEB
@slandail
https://slandail.net/
https://gbq.com/
2
One Step
at a Time
▫ Securing Executive Buy-In
▫ Identifying Your Third Parties
▫ Prioritizing Your Assessments
▫ Conducting Initial Assessments
▫ Ongoing Management
▫ Automation
▫ Further Reading
3
$39.4
million
4
▫“According to the 2013
Trustwave Global
Security Report on 450
global data breach
investigations, 63%
were linked to a third-
party component of IT
system administration.”
Target Isn’t
Alone
5
▫- From
http://www.computer
weekly.com/news/224
0178104/Bad-
outsourcing-decisions-
cause-63-of-data-
breaches
Verizon DBIR
6
Who’s In Scope?
7
Identifying Your
Third Parties
▫ Talk to Accounts Payable
▫ Survey your end users
▫ Review your outbound Internet
traffic logs
8
Prioritizing Your Assessments
9
Image from http://www.isaca.org/Journal/archives/2006/Volume-5/Pages/JOnline-
Understanding-Data-Classification-Based-on-Business-and-Security-Requirements1.aspx
Think Like an
End User
Confidentiality Integrity Availability
10
Identifying Your
Third Parties
▫ Document your assessment
phases
▫ Document your question set
▫ Track assessments like
engagements/projects
11
Are You
Asking Me, or
Telling Me?
Shared
Assessments
https://sharedasses
sments.org/
Cloud Security
Alliance Cloud
Controls Matrix
https://cloudsecurit
yalliance.org/
SANS CIS Critical
Security Controls
https://www.sans.or
g/critical-security-
controls
12
NIST 800-53 rev4
http://nvlpubs.nist.g
ov/nistpubs/Specia
lPublications/NIST.S
P.800-53r4.pdf
ISO 27002:2013
http://www.iso.org/
iso/catalogue_detail
?csnumber=54533
Common Sense
Security Framework
(CSSF)
http://www.commo
nsenseframework.or
g/
You Do This
▫ Security Risk
Assessment
Learn to Love
the Attestation
You Ask For These
▫ Security Controls
Assessment
▫ Technical
Vulnerability
Assessment
▫ Privacy Assessment
▫ Compliance
Assessment
▫ Penetration Test
▫ IT Audits
13
Don’t Fear the
OSINT
▫ Google Finance
▫ LinkedIn
▫ Chronology of Data Breaches
▫ PasteBin
▫ Qualys SSL Server Test
▫ Mozilla Observatory
▫ PunkSPIDER
▫ Shodan
▫ Censys14
Ongoing
Assessments
▫ Frequency?
▫ What’s Changed?
▫ Automate all the things!
15
Speaking of
Automation
▫ Prevalent
▫ Skyhigh Networks
▫ BitSight
16
Getting Ahead
of the Curve
▫ Lock down your internal data
classification procedures.
▫ Identify a process-oriented employee
who can own/manage this process.
▫ Start talking to IT Vendor Risk
Management vendors.
▫ Document a question set that’s relevant
to your organization (framework).
▫ Add a security/risk assessment
requirement to your purchasing
process/form.17
Further Reading ▫ Missed Alarms and 40 Million Stolen Credit Card
Numbers: How Target Blew It
▫ http://www.bloomberg.com/bw/articles/2014-
03-13/target-missed-alarms-in-epic-hack-of-
credit-card-data
▫ Verizon 2015 Data Breach Investigations Report
▫ http://www.verizonenterprise.com/DBIR/2015/
▫ NAVEX Global Definitive Guide to Third Party Risk
Management
▫ http://www.navexglobal.com/en-
us/resources/ebooks/definitive-guide-to-third-
party-risk18
19
THANKS! Any questions?
You can find me at
▫ @slandail
▫ jbrennen@gbq.com

More Related Content

More from Jerod Brennen

Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security FrameworkJerod Brennen
 
Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Jerod Brennen
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development processJerod Brennen
 
Bridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapBridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapJerod Brennen
 
Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsJerod Brennen
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101Jerod Brennen
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationJerod Brennen
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101Jerod Brennen
 

More from Jerod Brennen (8)

Common Sense Security Framework
Common Sense Security FrameworkCommon Sense Security Framework
Common Sense Security Framework
 
Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!Please, Please, PLEASE Defend Your Mobile Apps!
Please, Please, PLEASE Defend Your Mobile Apps!
 
Integrating security into the application development process
Integrating security into the application development processIntegrating security into the application development process
Integrating security into the application development process
 
Bridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit GapBridging the Social Media Implementation/Audit Gap
Bridging the Social Media Implementation/Audit Gap
 
Attacking and Defending Mobile Applications
Attacking and Defending Mobile ApplicationsAttacking and Defending Mobile Applications
Attacking and Defending Mobile Applications
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
DDoS Attack Preparation and Mitigation
DDoS Attack Preparation and MitigationDDoS Attack Preparation and Mitigation
DDoS Attack Preparation and Mitigation
 
Information Security Management 101
Information Security Management 101Information Security Management 101
Information Security Management 101
 

Recently uploaded

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxMarkAnthonyAurellano
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Timedelhimodelshub1
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailAriel592675
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 

Recently uploaded (20)

APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptxContemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
Contemporary Economic Issues Facing the Filipino Entrepreneur (1).pptx
 
Call Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any TimeCall Girls Miyapur 7001305949 all area service COD available Any Time
Call Girls Miyapur 7001305949 all area service COD available Any Time
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Case study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detailCase study on tata clothing brand zudio in detail
Case study on tata clothing brand zudio in detail
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 

Implementing an Effective Third Party Risk Management Program

  • 1. Implementing an Effective Third Party Risk Management Program
  • 2. Who am I? Jerod Brennen InfoSec Geek Security Architect, GBQ Partners Alphabet Soup: CISSP, GWAPT, GWEB @slandail https://slandail.net/ https://gbq.com/ 2
  • 3. One Step at a Time ▫ Securing Executive Buy-In ▫ Identifying Your Third Parties ▫ Prioritizing Your Assessments ▫ Conducting Initial Assessments ▫ Ongoing Management ▫ Automation ▫ Further Reading 3
  • 5. ▫“According to the 2013 Trustwave Global Security Report on 450 global data breach investigations, 63% were linked to a third- party component of IT system administration.” Target Isn’t Alone 5 ▫- From http://www.computer weekly.com/news/224 0178104/Bad- outsourcing-decisions- cause-63-of-data- breaches
  • 8. Identifying Your Third Parties ▫ Talk to Accounts Payable ▫ Survey your end users ▫ Review your outbound Internet traffic logs 8
  • 9. Prioritizing Your Assessments 9 Image from http://www.isaca.org/Journal/archives/2006/Volume-5/Pages/JOnline- Understanding-Data-Classification-Based-on-Business-and-Security-Requirements1.aspx
  • 10. Think Like an End User Confidentiality Integrity Availability 10
  • 11. Identifying Your Third Parties ▫ Document your assessment phases ▫ Document your question set ▫ Track assessments like engagements/projects 11
  • 12. Are You Asking Me, or Telling Me? Shared Assessments https://sharedasses sments.org/ Cloud Security Alliance Cloud Controls Matrix https://cloudsecurit yalliance.org/ SANS CIS Critical Security Controls https://www.sans.or g/critical-security- controls 12 NIST 800-53 rev4 http://nvlpubs.nist.g ov/nistpubs/Specia lPublications/NIST.S P.800-53r4.pdf ISO 27002:2013 http://www.iso.org/ iso/catalogue_detail ?csnumber=54533 Common Sense Security Framework (CSSF) http://www.commo nsenseframework.or g/
  • 13. You Do This ▫ Security Risk Assessment Learn to Love the Attestation You Ask For These ▫ Security Controls Assessment ▫ Technical Vulnerability Assessment ▫ Privacy Assessment ▫ Compliance Assessment ▫ Penetration Test ▫ IT Audits 13
  • 14. Don’t Fear the OSINT ▫ Google Finance ▫ LinkedIn ▫ Chronology of Data Breaches ▫ PasteBin ▫ Qualys SSL Server Test ▫ Mozilla Observatory ▫ PunkSPIDER ▫ Shodan ▫ Censys14
  • 15. Ongoing Assessments ▫ Frequency? ▫ What’s Changed? ▫ Automate all the things! 15
  • 16. Speaking of Automation ▫ Prevalent ▫ Skyhigh Networks ▫ BitSight 16
  • 17. Getting Ahead of the Curve ▫ Lock down your internal data classification procedures. ▫ Identify a process-oriented employee who can own/manage this process. ▫ Start talking to IT Vendor Risk Management vendors. ▫ Document a question set that’s relevant to your organization (framework). ▫ Add a security/risk assessment requirement to your purchasing process/form.17
  • 18. Further Reading ▫ Missed Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It ▫ http://www.bloomberg.com/bw/articles/2014- 03-13/target-missed-alarms-in-epic-hack-of- credit-card-data ▫ Verizon 2015 Data Breach Investigations Report ▫ http://www.verizonenterprise.com/DBIR/2015/ ▫ NAVEX Global Definitive Guide to Third Party Risk Management ▫ http://www.navexglobal.com/en- us/resources/ebooks/definitive-guide-to-third- party-risk18
  • 19. 19 THANKS! Any questions? You can find me at ▫ @slandail ▫ jbrennen@gbq.com

Editor's Notes

  1. Talk to Accounts Payable SOMEONE’S getting paid Survey your end users “Which websites do you login to in order to do your job?” Review your outbound Internet traffic logs Web traffic (cloud service logins) SFTP/SSH traffic (commonly used for secure file transfers)
  2. Document Your Assessment Phases Engagement Phase – Define scope, define rules of engagement, exchange information Assessment Phase – Review information, identify threats, estimate risk Review Phase – Document findings, make recommendations, present report for approval Document Your Question Set How much is too much? What is your internal security/compliance framework? NIST (FISMA), ISO 27000 Series, PCI, HIPAA Track assessments like engagements/projects Task owners, due dates, milestones
  3. Frequency? Low Priority = Annually Medium Priority = Semi-Annually High Priority = Quarterly What’s changed? Business model Operating environment/locations Technology stack Vendor’s partners AUTOMATE ALL THE THINGS!!!
  4. Consider deployed technologies GRC Solution (Governance, Risk, and Compliance) Service Desk Solution IT Vendor (& Cloud) Risk Management Prevalent - http://www.prevalent.net/ Skyhigh Networks - https://www.skyhighnetworks.com/ BitSight - https://www.bitsighttech.com/