What stone has possibly been left unturned in the search for cyber resilience? Find out here, and know the mitigation strategies

Teong Eng Guan, Regional Director (Southeast Asia & Korea), Check Point Software Technologies

Once identified, managing fourth-party risks involves:

  • Reviewing security controls: Request third parties to clarify how they monitor and secure their fourth-party relationships. Ensure their processes meet your organization’s stringent standards.
  • Evaluating service level agreements: Align third-party security incident response times with your organization’s recovery and regulatory requirements.
  • Ongoing monitoring: Use tools such as security scoring platforms and EASM to continuously assess vulnerabilities in both third- and fourth-party systems. Proactively track high-risk fourth parties to detect breaches or downtimes that could disrupt your operations.

  • Establish an enterprise-wide vendor management platform that integrates security scores and tracks updates on third- and fourth-party information
  • Require annual updates to these platforms, aligned with contract renewals and SLA reviews
  • Use responsibility assignment matrix charts to clearly define roles and responsibilities, to ensure that centralized and decentralized teams work cohesively