Institutions have a lot to consider when assessing third party risk, but if vendor risk management hasn’t followed the process of understanding the inner workings of their third party vendors, they may be in for a surprise to learn that their third parties operate in a similar function to themselves in the sense they too also use third party vendors.
These additional vendors in turn become the financial institution's fourth party vendors. The best way to think about this is that your process is made up of links and the more participants to the service you’ve outsourced opens your organization up to additional layers of risk.
There are many examples of fourth party vendors and all vary in terms of criticality and risk that they present to you. The level of oversight will vary depending on the criticality, but foundational best practices will help in addressing your initial risk assessment of these fourth parties and identify what types of risk they could present to you.
Consider the following company types:
The above examples are clear but with the increased use of technology in financial services companies, there is great demand on IT outsourcing and firms do leverage sub-contractors to fulfill many of the outsourced vendor risk management services.
Consideration must be given to the amount of access that any third party and fourth party vendor will be granted as part of the outsourcing agreement. There is overwhelming evidence that many data breaches are caused by third and fourth party vendors and the level of mistrust regarding data breach notification increases significantly between client and the fourth party.
Out of sight, out of mind. Since the institution does not have a direct contract with a fourth party, the thought of risk and liability have the tendency to be overlooked and this offers the potential to be the weak link in many third party risk management programs.
Surely, our third party is responsible for their own contractors, right? It’s a great question but considering the limited rep and warranty relief which vendors provide institutions, they are unlikely to be able to protect you from the fall out should something go wrong. We’re a big proponent of knowing your vendor and in light of the importance of fourth party oversight, the internal vendor management team must drill down into more detail with their existing and potential new third party vendors.
This is a common question for the vendor manager who has realized there's a gap in their policy and program. The best approach is to:
While this list isn’t exhaustive, it does provide a framework which you can include in your policy and program and be specifically geared towards fourth party oversight. The key point to remember as you further develop your fourth party oversight practices is that you need to scale the oversight requirements relevant to the level of criticality of the vendor and the type of data access they will be working with meaning critical and non-critical to the operations. There are many different types of fourth party vendors and each will offer a different type of risk which you need to be aware of and mitigate.
Want to know how to conduct vendor oversight on your other third and fourth party vendors? Download our infographic to learn how.