Third-Party Cyber Risk Controls In the Age of COVID-19

As organizations consider restarting operations and opening doors, how to engage their third parties becomes very important. Some third parties will have closed, been acquired or emerge radically different into the recovery. Are you prepared to discuss how they are focusing on securing the data you share with them in this new normal? There are many controls you should examine to ensure adequate cyber security maturity in your third parties. While all play an essential role, a massive crisis such as COVID-19 elevates specific controls to priority. 

At Kroll, we collect security data on organizations across the state and can evaluate it through the lens of our decades-old experience dealing with third parties. 

We have produced a list of controls to focus on as well as statistics to serve as rough benchmarks for you to start your third-party planning. We hope this document will help guide your prioritization of which controls to focus in on as you engage your third-party ecosystem and move your organization from “shelter-in-place” to “recovery.” A high-resolution PDF is also available for download, and we encourage its dissemination across your team to ensure the right controls are getting the proper attention. 

Third-Party Cyber Risk Readiness

Third-Party Cyber Risk Controls In the Age of COVID-19  

As indicated in the infographic, many third parties did not have the right controls in place heading into the COVID-19 pandemic and may be currently struggling as a result. 

How you move forward with your third parties may mean the difference between substantial success in recovery and challenges down the road. Kroll offers robust third-party risk management solutions, which includes cyber risk and enhanced due diligence.

 
Third-Party Cyber Risk Controls In the Age of COVID-19 2020-05-08T00:00:00.0000000 /en/insights/publications/cyber/third-party-cyber-risk-controls-covid-19 /-/media/kroll/images/publications/featured-images/2019/third-party-ecosystem-cyber-risk-covid.png publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {5739AB31-18AC-48E3-B19F-E23AB7AB9E57} {144A7548-A9F0-4228-93CC-9A86304CD5E8} {8DDC49CA-1D0A-451A-A649-F026824A6638}

Related Services

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Cyber Risk

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

Insights

Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk
Cyber Risk

COVID-19 + Shadow IT = Trouble Ahead

Cyber Risk
Cyber Risk

Has COVID–19 Impacted Your Ability to Preserve Evidence for Future Litigation?

Cyber Risk
Cyber Risk

Insider Threat Case Study: Digital Forensics Reveals Fraud, Potential Regulatory Concerns

Cyber Risk