How To Build Effective Third Party Risk Metrics
How To Build Effective Third Party Risk Metrics
2
As organizations become increasingly interconnected, granting third parties access
to data and systems becomes not just beneficial, but necessary. This, however, can
open the door to third-party vulnerabilities and incidents like data breaches and supply
chain attacks, with the potential for severe consequences. Boards of directors and
business leaders are thus demanding more visibility into their organizations’ vast
third-party ecosystems.
To mitigate the impact of these risks, it is crucial to understand this multifaceted ecosystem and its moving
parts: the people involved, processes, and technologies. Third-party risk management (TPRM) can help
you tackle these challenges. When implemented correctly, a TPRM program can enable you to identify and
mitigate risks before they negatively impact your organization.
It’s therefore crucial to identify, formulate and implement the appropriate TPRM metrics for your
organization. Addressing the challenges associated with identifying and mitigating third-party risks also
calls for thorough planning and a comprehensive understanding of the correlation between metrics and
business objectives.
• Guide you through the process of developing and implementing the right TPRM metrics across different
stages of the third-party vendor risk management lifecycle
• Share best practices and critical factors to consider when formulating TPRM metrics
This paper is for teams such as Risk Management, Procurement and Sourcing, Security and IT, Audit and
Compliance, Data Privacy, and others responsible for identifying and implementing TPRM metrics.
3
TPRM Metrics and Their Significance
Before deciding which metrics to set up, we need to delve into what TPRM metrics are, their importance, and
what types of metrics categories you should be aware of.
TPRM metrics are indicators that assist an organization in gauging the progress of its TPRM strategy and
program. When executed correctly, these metrics reassure the organization’s leadership, board of directors
and auditors that the third parties they work with pose an acceptable level of risk. If these third parties
are associated with unacceptable risks, then having the right metrics will simplify the remediation and
mitigation processes.
It is therefore important for an organization to have meaningful metrics that consist of a consolidated set of
key risk indicators (KRIs) and key performance indicators (KPIs). These will aid in reducing the analysis of
large, complex security dashboards and enable teams to filter the relevant data they need to identify and
remediate risks.
4
Identifying, formulating and tracking the right TPRM metrics are crucial tasks for the following reasons:
5
Developing TPRM Metrics
Having examined the significance of TPRM metrics, let’s delve into the process of developing effective TPRM
metrics for teams to use. Figure 1 below illustrates the process:
1
CEO/
CEO/
Enterprise Set Enterprise Objectives Centralized Vendor
Board
Risk Council & Supplier Profiles
3
Department Teams Identify Third Parties Correlated Risk Register
4 5
Identify Identify
Remediation
Risks Performance
Performance Tracking
to Measure Indicators
6
Harmonize Metrics Across
the TPRM Lifecycle Reporting to Stakeholders
6
Process: Defining Who and What to Measure
Upon addressing these questions, the ERC then develops the enterprise objectives for TPRM, potentially
utilizing a solution offered by a TPRM vendor. These may include:
• Protecting the organization’s and customers’ sensitive data and intellectual property
• Ensuring business resilience with a clear action plan, and ensuring team members understand their roles
and responsibilities
It’s also essential at this point to understand the difference between KPIs and KRIs,
as both are equally important to TPRM metrics.
• Key Performance Indicators (KPIs) • Key Risk Indicators (KRIs) measure the
measure the effectiveness of organizational level of risk the organization faces and how
processes and functions effectively it’s being managed
7
As part of a robust third-party risk management strategy, your organization should focus on four primary
areas of measurement. Each area consists of KPIs and KRIs that provide invaluable insights into your
relationship with suppliers.
• Risk Metrics
These metrics help in assessing the risks associated
with specific suppliers. They provide insights
into potential threats, corresponding mitigation
strategies, and the supplier’s adherence to both
primary and remunerative controls.
• Threat Metrics
These metrics consist of publicly available data
relating to cyber, operational, financial and
reputational aspects. They help to address how
vendor risk data correlates with externally observable threats.
• Compliance Metrics
These metrics reveal how well suppliers’ practices comply with your organization’s internal control
environment. They also measure adherence to regulatory requirements and frameworks, which is critical
for maintaining legal and industry standards.
• Coverage Metrics
These metrics are designed to ensure that your organization has a complete understanding of its global
supplier footprint. They help identify the third, fourth and Nth parties in your supply chain and verify
whether they have been classified appropriately in your program.
The first two categories, Risk and Threat Metrics, largely consist of KPI and KRI metrics related to risk
factors and external influences. The latter two categories, Compliance and Coverage metrics, are geared
more toward internal program evaluation and alignment. These four categories together provide a
comprehensive and balanced approach to third-party risk management.
Now that we have an understanding of the different categories of TPRM metrics, we can proceed to establish
objectives at the departmental level.
• What sensitive data and systems in our department can third parties access?
Once this is completed, departmental teams are formed, led by the departmental heads. These teams will
have several responsibilities that are highlighted in the following steps.
8
Step 3: Identify Third Parties
The departmental teams begin by identifying third parties such as vendors, suppliers, contractors, logistics
partners, cloud service providers, or others. At this stage, teams might work with procurement, accounts
payable or other internal teams that maintain a working list of vendors and suppliers to centralize those third
parties for better governance.
Recommendation:
Your organization might be confronted with several supplier
risks that you were previously not aware of. Find out what these
different types of risks are and how to mitigate them by reading
the blog: Top Supplier Risks and What to Do About Them
• Data Integration across Multiple Systems: This refers to the consolidation and integration of
platforms to provide a unified view of vendor risk across the organization.
• Simplicity of Analysis: Automating programmatic processes can help manage the large volume of data
that needs to be analyzed.
9
• Interpretation and Contextualization: This involves understanding the audience and context to
provide clear, succinct and meaningful information.
• Report Formatting and Communication: The ability to distill, communicate and present data in a
user-friendly format is crucial.
• Timeliness and Frequency: The capacity to continuously monitor vendors and understand risk
developments in real time is paramount in any effective TPRM program.
Teams can also seek support and recommendations from your TPRM vendor at this stage. Experienced
vendors typically offer libraries containing relevant content, playbooks and other information to aid in
identifying pertinent risks, tracking performance indicators, building reporting strategies, and addressing
other concerns.
Use these tips to avoid common pitfalls when setting up TPRM metrics:
10
Step 6: Harmonize Metrics Across the TPRM Lifecycle
In this step, the ERC collaborates with department heads and establishes working groups to align all the
identified risks and performance indicators. The groups then work to standardize and synchronize metrics
across each stage of the Third-Party Vendor Risk Management Lifecycle.
The following chart highlights select metrics that should be considered at each stage along with the
department that would typically be involved:
Relevant to These
Cross-Functional Teams
& Compliance
Internal Audit
Management
Procurement
IT Security
Third-Party Risk
Select TPRM Metrics
Finance
Lifecycle Stage
Risk
• Number of Tier 1 suppliers that have not returned self-attestation
11
Relevant to These
Cross-Functional Teams
& Compliance
Internal Audit
Management
Procurement
IT Security
Third-Party Risk
Select TPRM Metrics
Finance
Lifecycle Stage
Risk
• % difference between supplier self-attestation and threats based
on intelligence sources
Recommendation:
To find out more about how to identify
the right TPRM metrics, read the eBook
“The 25 Most Important KPIs and KRIs
for Third-Party Risk Management” and
download the scorecard.
12
The Prevalent
TPRM Solution
Whether you are starting a new TPRM program or want to
optimize your existing TPRM metrics initiatives, Prevalent
can provide the solutions, services and support you need.
This is backed by our experienced professional services (PS) team, who can help you further streamline the
process by:
• Helping to identify pertinent KPI and KRI metrics across the vendor lifecycle
• Supporting you throughout the remediation process, as well as tracking resolution procedures
• Providing access to a comprehensive library of TPRM content, specifically around custom reporting,
TPRM programs, and related performance criteria
• Supplying your teams with essential support and documentation based on various persona-based
status workflows
To get started with measuring key metrics, download the eBook and scorecard, The 25 Most Important KPIs and
KRIs for Third-Party Risk Management. Then, schedule a demo to learn how Prevalent can help you automate
and accelerate your TPRM metrics program.
13
About Prevalent
Prevalent takes the pain out of third-party risk management (TPRM).
Companies use our software and services to eliminate the security and
compliance exposures that come from working with vendors and suppliers
throughout the third-party lifecycle. Our customers benefit from a flexible,
hybrid approach to TPRM, where they not only gain solutions tailored to their
needs but also realize a rapid return on investment. Regardless of where they
start, we help our customers stop the pain, make informed decisions, and
adapt and mature their TPRM programs over time.
© Prevalent, Inc. All rights reserved. The Prevalent name and logo are trademarks or registered trademarks of Prevalent, Inc.
All other trademarks are the property of their respective owners. 8/23
14