Developing and Maintaining a World-Class Third Party Risk Assessment Program



Similar documents
Top 10 Tips for Effectively Assessing Third-party Vendors

PwC Viewpoint on Third Party Risk Management

Third-Party Cybersecurity and Data Loss Prevention

2014 Vendor Risk Management Benchmark Study

PwC Health Industries Viewpoint on Third Party Risk Management

KLC Consulting, Inc. All Rights Reserved. 1 THIRD PARTY (VENDOR) SECURITY RISK MANAGEMENT

CORL Dodging Breaches from Dodgy Vendors

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Dodging Breaches from Dodgy Vendors: Tackling Vendor Risk Management in Healthcare

2015 Vendor Risk Management Benchmark Study. The Shared Assessments Program and Protiviti Examine the Maturity of Vendor Risk Management

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Identifying and Managing Third Party Data Security Risk

DATASHEET CONTROL COMPLIANCE SUITE VENDOR RISK MANAGER 11.1

Third Party Risk Management 12 April 2012

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Business Associates under HITECH: A Chain of Trust

HITRUST CSF Assurance Program

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Managing data security and privacy risk of third-party vendors

Enterprise Risk Management VCU Process

BUSINESS ASSOCIATE PRIVACY AND SECURITY ADDENDUM RECITALS

Managing Open Source Code Best Practices

9/14/2015. Before we begin. Learning Objectives. Kevin Secrest IT Audit Manager, University of Pennsylvania

Governance, Risk, and Compliance (GRC) White Paper

Risk Management: IT Vendor Management and Outsourcing

Why Add Data Masking to Your IBM DB2 Application Environment

IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Cyber, Security and Privacy Questionnaire

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

SECURITY RISK MANAGEMENT

Healthcare Payment Processing: Managing Data Security and Privacy Risks

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

Best Practices for DLP Implementation in Healthcare Organizations

In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including:

Data Loss Prevention and HIPAA. Kit Robinson Director

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Data Security & PCI Compliance & PCI Compliance Securing Your Contact Center Securing Your Contact Session Name :

Your world runs on applications. Secure them with Veracode.

Information Security Program CHARTER

Top 10 Tips and Tools for Meeting Regulatory Requirements and Managing Cloud Computing Providers in the United States and Around the World

SHARED ASSESSMENTS PROGRAM STANDARDIZED INFORMATION GATHERING (SIG) QUESTIONNAIRE

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Two Approaches to PCI-DSS Compliance

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Business Associate Management Methodology

INFORMATION TECHNOLOGY RISK MANAGEMENT PLAN

PCI Compliance: How to ensure customer cardholder data is handled with care

2012 HIPAA Privacy and Security Audits

PROJECT MANAGEMENT PLAN <PROJECT NAME>

WHITE PAPER THIRD PARTY MANAGEMENT: FUNDAMENTALS

Sample Statement of Work

PCI Compliance for Healthcare

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Nine Network Considerations in the New HIPAA Landscape

Well-Documented Controls Reduce Risk and Support Compliance Initiatives

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

SECURETexas Health Information Privacy & Security Certification Program FAQs

Vendor Management Panel Discussion. Managing 3 rd Party Risk

PCI DSS READINESS AND RESPONSE

HIPAA SECURITY RISK ANALYSIS FORMAL RFP

White Paper on Financial Institution Vendor Management

Outbound Security and Content Compliance in Today s Enterprise, 2005

Payment Card Industry Data Security Standard (PCI DSS) v1.2

HIPAA and HITRUST - FAQ

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Gilead Clinical Operations Risk Management Program

SUPPLY CHAIN ASSURANCE FRAMEWORK: THE SUPPLY CHAIN STANDARDS TRANSLATOR

Building Best Practices for Effective Monitoring of a Third Party s Incident Event Management Program. A Shared Assessments Briefing Paper

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Department of Children and Families (DCF) Request for Information (RFQ) #01U013DS1 HIPAA Compliance Review DCF Answers to Vendor Questions

OC Chapter. Vendor Risk Management. Cover the basics of a good VRM program, standards, frameworks, pitfall and best outcomes.

3 rd -party Security Risk Assessment

The Importance of Senior Executive Involvement in Breach Response

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Publication 805-A Revision: Certification and Accreditation

Transcription:

Developing and Maintaining a World-Class Third Party Risk Assessment Program Presented by: Tom Garrubba, Senior Director, The Santa Fe Group/Shared Assessments Program Monday, September 15, 2014 - IIA Pittsburgh

Agenda Why the sudden focus on third party risk? Increased regulatory and standards focus Increased targeting of service providers How a Premier integrated pharmacy services provider built their TPR Management Program Laying the ground work for using vendor questionnaires Vendor identification Vendor classification TPR Program Lifecycle Phase I Pre-assessment Phase II Assessment Phase III Post-Assessment Phase IV Criteria Evaluation 2

Agenda Discussion of Tools to Use The VRMMM (Vendor Risk Management Maturity Model) The SIG and SIG Lite (Standard Information Gathering) Questionnaires Key take-aways 3

Regulatory Pressure Increasing 1996 Jul 01 Nov 01 May 02 Aug 03 May 07 Nov 09 Jan 10 Mar 10 Jul 10 Jan 11 Mar 12 Mar 13 Oct 13 May 14 HIPA A GLBA OCC Bulletin 2001-47 OCC Bulletin 2002-16 CS Privacy SB 1386 HF 1758 MN Plastic Card Security Act Protected Data Types Intellectual Property (IP) Personally Identifiable Information (PII) Payment Card Industry (PCI) Protected Health Information (PHI) HITECH Act NRS 603 NV Data Security 201 MA Code Reg 17 WA HB 1149 PCI DSS 2 CFPB Bulletin 2012-03 Omnibus HIPAA Rule OCC Bulletin 2013-29 PCI DSS 3 Source: Prevalent http://www.prevalent.net/

Mega Breaches 2011 2012 2013 Breaches 208 165 253 Identities Exposed 232M 93M 552M Breaches >10M 5 1 8 2013 was the Year of the Mega Breach 5

Breaches by Sector Data Breaches by Sector, 2013 Source: Symantec Data Breaches by Sector, Percent of Identities Exposed, 2013 Source: Symantec 12% Government Education 16% Healthcare 44% Other 12% 7% Accounting 5% Retail 4% Computer Software 3% Financial 3% 3% 3% Transportation Insurance Hospitality Computer Software 16% Financial 19% Retail 30% Social Networking 9% 4% 4% 2% 2% 1% 1% Information Technology Hospitality Telecom Accounting Healthcare Other Healthcare, education and the public sectors accounted for 58% of all data breaches But, the retail, computer software and financial sectors accounted for 77% of all identities exposed in 2013 6

Costs Associated with a Breach companies had to spend more on their investigations, notification and response when their sensitive and confidential information was lost or stolen. As revealed in the 2014 Cost of Data Breach Study: Global Analysis, sponsored by IBM, the average cost to a company was $3.5 million in US dollars and 15 percent more than what it cost last year (2013). - Source: Ponemon Institute; Cost of Data Breach: Global Analysis; (May 5, 2014) 7

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program 8

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program Initiation and Alignment Use this formula for a successful implementation P = p1(p2 + p3) Garrubba-Mortensen Theorem* * the o rem/ˈthēərəm/ 1. Noun: A general proposition not self-evident but proved by a chain of reasoning; a truth established by means of accepted truths. 2. A rule in algebra or other branches of mathematics expressed by symbols or formulae. (Source: Wikipedia Dictionary) 9

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program Initiation and Alignment Use this formula for a successful implementation P = p1(p2 + p3) Process - series of documented actions or operations; streamlined! Questionnaires, audit steps, internal & external resources; documentation to review; Turnaround times; Communication protocol, reporting P = p1(p2 + p3) Practices - your way of doing things Daily tasks: must be consistent and understood by your management! p2 + p3 = your operating procedures to execute assessments! P = p1(p2 + p3) Policy Written and Communicated by the C-suite; may even be an executive Proclamation (Must have in first position!) 10

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Program developed to ensure vendors that collect, store, transmit, use, process, interface, or destroy data on behalf of CVS Caremark have an adequate information security program and privacy controls in place to protect confidential information: Protected Health Information (PHI) Personally Identifiable Information (PII) Payment Card Industry - Data Security Standard (PCI) - Cardholder Data (aka, CHD ) Strategic (proprietary), operational or financial information of CVS Caremark 11

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program The CVS Caremark VAP is based on the BITS Shared Assessment framework Covers both existing vendors and potential new vendor relationships if they are to have access to confidential or strategic information: Any of their subcontractors that may have access to CVS Caremark data Off-Shore vendors/subcontractors Vendors with MED-D impact 12

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Assesses Business Partners who associate with CVS Caremark to address an objective of CVS Caremark: Clinical research partners Universities (healthcare studies) 13

Case Study: How a Premier integrated pharmacy services provider build their TPR Management Program Quantified our risk with Third Party Service Providers via Exposure Ranking (performed before a new assessment) Number of Records Type of Data (Basic PII, Sensitive PII, PHI, CHD, IP) Annual Spend (in $$$) VARR (Vendor Assessment Risk Rating) Score (performed after a net-new assessment for the purposes of scheduling a reassessment) Exposure Ranking SIG Score Assessor Score 14

Types of Implementation TPRP Operations can be implemented in one of two structures: Centralized Decentralized 2011 The Shared Assessments Program. All Rights Reserved. 15

Centralized Structure Centralized operations tend to have the following: Contained within a single business unit reporting to a CxO Is known to all stakeholders (i.e., BU s) across the enterprise Offers a one-stop shop for other stakeholders to go to Applies consistent assessment methodologies and execution strategies Tend to have more structure in their processes and practices Tends to apply the P = p1(p2+p3) formula More smoothly run operationally 16

Centralized Structure (Challenges) It s often difficult for VAP assessors to know all that is going on with larger third party service providers (i.e., multiple scopes, project, applications being supported, etc.) Getting timely participation by smaller TPSP s who are managed by large business partners/vendors to cooperate, that is; the assessment tends to get lost in the shuffle by the parent vendor overseeing the relationship May not truly understand the needs of every BU and why they have selected or are using a particular TPSP If an assessment doesn t go well bad blood may occur to have to force the BU to cut the TPSP off! 17

Example: Centralized Structure CISO/ CPO/ CIO/ CCO/ COO/CRO/CA VP/ Managing Director Director/Manager Third Party Risk Program (Administration) Director/Manager Third Party Risk Program (Security Assessments) External Assessment Augmentation VAP Analyst Security Assessor VAP Analyst Security Assessor VAP Analyst Security Assessor 18

Decentralized Structure TPR Assessors reside in multiple business units, reporting up to multiple Business Unit VP s; silo-ed operations Solid-line up to the BU VP Dotted-line to a VAP Manager/Director Stakeholders (i.e., BU VP s) want control over their TPSP s, thereby handling the assessment of the TPSP gives them a form of control BU s who tend to maintain an IT services team in their group usually have someone dedicated to TPR tasks 19

Decentralized Structure (Challenges) Tend not to have a centralized policy and apply inconsistent assessment methodologies and execution strategies (that is; not utilize P = p1(p2+p3) ) Inconsistent assessment methods likely occur as assessors tend to use different tools for assessments (i.e., using tools other that the SIG) May pose little knowledge sharing outside of the BU with respect to their TPSP s or the results of the assessments May have inconsistent report distribution of assessments to appropriate levels of management Assessment reports do not always get to other Stakeholders who may utilize the TPSP for other projects 20

Example: Decentralized Structure 21

Types of Implementations What Method is right for your organization? Centralized Decentralized YOU NEED TO DECIDE! 2011 The Shared Assessments Program. All Rights Reserved. 22

Laying the Groundwork for Using TPSP Questionnaires Know your TPSP Identification who are they and want do they do? Who are your third party service providers? What services do they provide? Classification what risk do they present to your organization? Vendor risk rating and classification 23

TPSP Identification Who are your third party service providers? Shared services Software providers Cloud providers and other hosted services Outsourced services (e.g., certain HR functions) Vendors Any entity who provides you with goods/services 24

TPSP Classification Define your TPSP s by what they do (i.e. scope of work) and what they can access (e.g., data): What data/systems do they have access to? PII? PHI? CHD (PCI)? Corporate confidential/intellectual property? What is the risk to that data/system? What is the risk exposure (or ranking ) to that data? What is your tolerance of risk? How is it calculated? Is it the same across the board (i.e., same for PII, PHI, CHD, IP/strategic, etc.)? 25

TPSP Classification TPSP risk classification/rating Established standards for risk tiers/classifications based on corporate risk tolerance Contract requirements Level/type of assessment Frequency of assessment Consistent assignment of vendor risk classifications Validation of TPSP risk classification included in periodic assessment 26

TPSP Assessment Program Lifecycle TPSP Self-assessments Define scope Define data in use Distribute SIG Phase 1: Pre- Assessment Phase 2: Assessment Perform kickoff Obtain BU and vendor docs Acquire SIG responses TPSP risk rating Change(s) in services Risk scoring Phase 4: TPSP Criteria Evaluation Phase 3: Post- Assessment Update BU and vendor management Track CI s ( issues ) BU/vendor docs Remediate CI s 27

Phase 1 Pre-Assessment Who? Who exactly do we assess? What? What are we to assess? Where? Where should we assess them (i.e., what locations?) When? When do we assess? When do we re-assess? 28

Who Do We Assess? Any vendor that performs the following to our data: Collect Store Transmit/transport Use Process Interface Destroy 29

What are we to Assess? At what level do we look at the vendor? Enterprise? Geographic? Business line (i.e., service)? Scope/solution specific? Combination of one or more of the above? 30

What are we to Assess? Determine the scope of the assessment TPSP risk rating Standard corporate requirements Type of services provided Type of data Periodic or event triggered Determine appropriate assessment questionnaire to be utilized Provide instructions to TPSP Specific requirements Assessment timeline 31

Where do we Assess them? State-side: Any place handling your sensitive information that if a breach occurs it could result in significant damage or unnecessary costs to your organization Offshore: Any country; but certainly one that is not bound by a safe-harbor agreement 32

When do we Assess and Re-assess? Assess: When you are notified of: A new TPSP or an existing TPSP that experiences a change to their business An existing vendor with a modification of their current scope of work An existing vendor with a new/different scope of work Re-assess: When you are notified of: A scheduled point in time for the reassessment to begin based on predetermined criteria 33

Phase 2 - Conducting The Assessment Who should conduct the assessment? Type of Governance Centralized Decentralized Business Unit TPSP management organization TPSP relationship manager(s) Risk management Corporate compliance Procurement IT security Training 34

Phase 2 - Conducting The Assessment Who should conduct the assessment? Resource considerations Training Budget External 35

Phase 2 - Conducting The Assessment Phase 2 tasks Kickoff meeting with vendor Contacts? Deliverables? Timelines? Request/review pertinent documentation: Documentation Contracts, SOW s, NDA s TPSP internal docs Follow up on any discrepancies regarding services/locations Identify any potential critical items/contingent items (CI s) i.e., audit issues/findings Have exit interview to ensure CI s are accurate Compose the assessment report Report presented to vendor and internal business owner 36

Phase 2 - Conducting The Assessment How to effectively use assessment results Use your assessment results Prioritize risk rank areas and/or specific questions Establish a process to define and identify TPSP performance issues Report vendor performance issues to appropriate levels of management 37

Phase 3 - The Post-Assessment Remediating vendor performance issues All issues should be risk ranked and prioritized for corrective action Assign appropriate individual(s) responsible for closing issues Timeline for closing issues should be established and communicated to vendor Monitor prioritized issues to ensure corrective action is taken in a timely manner Escalate to management if timelines not met When termination is unavoidable 38

Phase 4 Criteria Evaluation TPSP termination without business interruption Well defined termination/exit strategy must be fair to both parties Ongoing services during winding down period Work product and IP transition Same TPSP team to remain in place (unless they are the issue) Cooperation with new vendor Parallel services Cost Data security and transfer/destruction (with applicable assertion) Recovery/destruction of data from subcontractors Ability to audit/validate requirements met 39

Phase 4 - Criteria Evaluation How frequently should a TPSP be assessed? Scheduled/periodic review schedule should be developed during requirements phase and based on the TPSP risk rating, and other prioritized factors Event triggered reviews/assessments are based on specifically identified events Data breach/incident Merger/acquisition Act of God Contract breach Performance failure Location changes 40

Discuss: the Full SIG Lite and SIG Lite Full SIG When to use the full SIG SIG Lite When to use it in lieu of the full SIG 41

The Shared Assessments Vendor Risk Management Maturity Model (VRMMM) The focus of the VRMMM is to provide third party risk managers with a tool they can use to evaluate their program against a comprehensive set of best practices. Using governance as the foundational element, the model identifies the framework elements critical to a successful program. 42

The Shared Assessments Vendor Risk Management Maturity Model (VRMMM) High-level components are broken down into subcomponents in a manner that makes the model adaptable across a wide spectrum of industry groups. Being able to identify specific areas for improvement the VRMMM allows companies to make well-informed decisions on how to spend limited resources to most effectively manage vendor related risks. 43

The Finish Line Your Take-Away s 1. Have a general understanding what it takes to implement and maintain a TPR assessment program 2. Make sure you have developed a thorough framework for using vendor questionnaires 3. Know your W s the who, what, where and when of vendor assessment 4. Make sure that completed TPSP questionnaires are properly reviewed and mitigation plans are developed and tracked for completion 44

For More Information www.sharedassessments.org Resources FAQs and tips for getting started Case studies Enterprise Cloud Computing Guide Members Partners Join us on LinkedIn! Contact: Julie Lebo; VP of Member Relations: 703-533-7256 ; julie@santa-fe-group.com Tom Garrubba; Sr. Director, Shared Assessments Program: 412-720-4248; tom@santa-fe-group.com