Phone: (+44) 113 216 3188
  • Email: info@koyertraining.com
Koyer Training Services
  • Home
  • About Us
  • Our Programs
  • Our Venues
  • Contact Us

Third-Party Cyber Risk Management

Cybersecurity and Digital Risk October 25, 2025
Enquire About This Course

Introduction

As organisations rely more heavily on cloud providers, vendors, and partners, the supply chain has become a primary vector for high-impact cyber attacks. This course provides a comprehensive framework for establishing and maturing a Third-Party Cyber Risk Management (TPCRM) program. It covers the entire vendor lifecycle, from initial due diligence and contract negotiation to continuous monitoring and termination. Participants will master how to assess, manage, and mitigate the risks introduced by external entities, ensuring contractual security obligations are met and maintaining a resilient supply chain against modern threats.

Objectives

This program is designed to equip security, procurement, and risk professionals with the strategic and practical knowledge to manage cyber risk introduced by vendors, suppliers, and third parties:

Target Audience

  • Vendor Risk Management Specialists.
  • Procurement and Sourcing Managers.
  • Compliance and GRC Professionals.
  • Security Architects and Engineers.
  • Internal Auditors and Assurance Providers.
  • CISO and Security Directors.
  • Legal Counsel involved in vendor contracts.

Methodology

  • Group activities developing a tiered vendor classification model for a fictional company.
  • Case studies on major supply chain attacks and lessons learned.
  • Discussions on best practices for negotiating security contract clauses with vendors.
  • Individual exercises reviewing a mock SOC 2 report for critical findings.
  • Role-playing a security risk discussion with a vendor whose service is essential but insecure.

Personal Impact

  • Ability to design and operate a robust, risk-based Third-Party Risk Management program.
  • Expertise in vendor security due diligence and contract negotiation.
  • Mastery of continuous monitoring tools and techniques for vendor risk.
  • Skills to analyze and mitigate complex supply chain and fourth-party risk.
  • Enhanced credibility in collaborating with Legal and Procurement teams.
  • Capability to translate vendor security findings into business risk for executives.

Organizational Impact

  • Significant reduction in risk exposure from third-party and supply chain breaches.
  • Consistent enforcement of security requirements across the vendor ecosystem.
  • Improved compliance with regulatory requirements for vendor oversight.
  • Streamlined and faster procurement process due to defined security requirements.
  • Greater organisational resilience to supply chain attacks.
  • Better allocation of due diligence resources based on vendor criticality.

Course Outline

Unit 1: TPCRM Program Foundation and Strategy

Section 1.1: The Third-Party Risk Landscape
  • Understanding major third-party breaches (e.g., SolarWinds, cloud provider outages).
  • Defining third-party, fourth-party, and supply chain risk.
  • Mapping vendor risk to business processes and critical assets.
  • Establishing the scope and charter of the TPCRM program.
Section 1.2: Vendor Classification and Tiers
  • Developing a risk-based vendor classification methodology (e.g., Tier 1-3).
  • Criteria for classifying vendors (access to data, system criticality, services provided).
  • Defining the minimum security requirements for each vendor tier.
  • The importance of identifying concentration risk with single providers.

Unit 2: Due Diligence and Assessment

Section 2.1: Pre-Contract Assessment
  • Developing standardized security questionnaires (e.g., SIG, CAIQ) based on risk tier.
  • Reviewing vendor-provided evidence (e.g., SOC 2 reports, ISO certifications).
  • Conducting remote or on-site security audits for high-risk vendors.
  • Integrating due diligence into the procurement and sourcing workflow.
Section 2.2: Contractual Controls
  • Key security clauses for Data Processing Agreements (DPAs) and contracts.
  • Defining breach notification and incident response requirements.
  • Establishing audit rights, liability limits, and cyber insurance requirements.
  • Negotiating Service Level Agreements (SLAs) for security performance.

Unit 3: Monitoring and Risk Mitigation

Section 3.1: Continuous Monitoring
  • Implementing continuous vendor monitoring using security rating services.
  • Techniques for monitoring fourth-party risk and sub-processors.
  • Tracking, scoring, and prioritizing vendor-reported vulnerabilities.
  • Periodic re-assessment and re-classification of existing vendors.
Section 3.2: Risk Treatment and Mitigation
  • Developing a Vendor Risk Register and tracking remediation plans.
  • Strategies for mitigating high-risk findings (e.g., alternative controls, risk acceptance).
  • Managing and reporting on exceptions to vendor security requirements.
  • Working collaboratively with vendors to drive security improvements.

Unit 4: Specialized Third-Party Risks

Section 4.1: Cloud and SaaS Risk
  • Assessing the security of public cloud providers (AWS, Azure, GCP).
  • Managing risk under the Cloud Shared Responsibility Model.
  • Reviewing Cloud Access Security Broker (CASB) reports for SaaS usage.
  • Data residency and sovereignty requirements for cloud vendors.
Section 4.2: Supply Chain Security
  • Managing risk from software supply chain attacks (e.g., embedded malware, code integrity).
  • Reviewing Software Bill of Materials (SBOM) from critical suppliers.
  • Securing the hardware supply chain (e.g., embedded devices, network gear).
  • Developing an integrated supply chain incident response plan.

Unit 5: Governance and Program Maturity

Section 5.1: Governance and Reporting
  • Defining Key Risk Indicators (KRIs) for third-party risk exposure.
  • Reporting on the overall third-party risk posture to executive leadership.
  • Integrating TPCRM with the broader Enterprise Risk Management (ERM).
  • Managing the off-boarding and data destruction process upon contract termination.
Section 5.2: Program Maturity and Automation
  • Developing a multi-year roadmap for TPCRM maturity.
  • Leveraging GRC platforms to automate assessments and monitoring.
  • Training and awareness for business unit owners on vendor risk.
  • The future of third-party risk with AI and machine learning analysis.

Ready to Learn More?

Have questions about this course? Get in touch with our training consultants.

Submit Your Enquiry

Upcoming Sessions

15 Dec

Paris

December 15, 2025 - December 19, 2025

Register Now
05 Jan

Riyadh

January 05, 2026 - January 09, 2026

Register Now
26 Jan

Rome

January 26, 2026 - February 06, 2026

Register Now

Explore More Courses

Discover our complete training portfolio

View All Courses

Need Help?

Our training consultants are here to help you.

(+44) 113 216 3188 info@koyertraining.com
Contact Us
© 2025 Koyer Training Services - Privacy Policy
Search for a Course
Recent Searches
HR Training IT Leadership AML/CFT