Third-Party Cyber Risk Controls In the Age of COVID-19

As organizations consider restarting operations and opening doors, how to engage their third parties becomes very important. Some third parties will have closed, been acquired or emerge radically different into the recovery. Are you prepared to discuss how they are focusing on securing the data you share with them in this new normal? There are many controls you should examine to ensure adequate cyber security maturity in your third parties. While all play an essential role, a massive crisis such as COVID-19 elevates specific controls to priority. 

At Kroll, we collect security data on organizations across the state and can evaluate it through the lens of our decades-old experience dealing with third parties. 

We have produced a list of controls to focus on as well as statistics to serve as rough benchmarks for you to start your third-party planning. We hope this document will help guide your prioritization of which controls to focus in on as you engage your third-party ecosystem and move your organization from “shelter-in-place” to “recovery.” A high-resolution PDF is also available for download, and we encourage its dissemination across your team to ensure the right controls are getting the proper attention. 

Third-Party Cyber Risk Readiness

Third-Party Cyber Risk Controls In the Age of COVID-19  

As indicated in the infographic, many third parties did not have the right controls in place heading into the COVID-19 pandemic and may be currently struggling as a result. 

How you move forward with your third parties may mean the difference between substantial success in recovery and challenges down the road. Kroll offers robust third-party risk management solutions, which includes cyber risk and enhanced due diligence.

 
Third-Party Cyber Risk Controls In the Age of COVID-19 2020-05-08T00:00:00.0000000 /en/insights/publications/cyber/third-party-cyber-risk-controls-covid-19 /-/media/kroll/images/publications/featured-images/2019/third-party-ecosystem-cyber-risk-covid.png publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {5739AB31-18AC-48E3-B19F-E23AB7AB9E57} {144A7548-A9F0-4228-93CC-9A86304CD5E8} {8DDC49CA-1D0A-451A-A649-F026824A6638}

Other Areas We Can Help

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Cyber Risk

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

Insights

Cyber Risk

CyberClarity360 Express Helps Fortune 25 Technology Client Identify and Prioritize Legal Vendor Cyber Risk

Cyber Risk
The Monitor

Telerik Vulnerability (CVE-2019-18935) Creates Surge in Web Compromise and Cryptomining Attacks - The Monitor, Issue 14

The Monitor
Cyber Risk

Cybersecurity Breaks Out of Its Silo

Cyber Risk