Topic 1. Overview of Third-Party Risk Management
Topic 2. key Risks Associated with TPRM
Topic 3. TPRM Life Cycle
Topic 4. Third Party Case Studies
Topic 5. Capital One
Topic 6. Morgan Stanley
Scope: Extends beyond third parties to the entire supply chain, including fourth parties (third parties of third parties) and even fifth parties.
Cost Savings: Outsourcing to specialized firms with competitive advantages in systems and processes.
Risk Mitigation: Contracting with experts to reduce operational and other risks, such as process and data errors.
Additional Risks (Offshore Vendors): Country risk, legal, and compliance risks.
Growing Importance of TPRM
Increased outsourcing of core processes (e.g., loan processing, electronic fund transfers, payroll, treasury management).
Accelerated by IoT devices and the COVID-19 pandemic.
Criticality: Storing and protecting sensitive data (e.g., Avanti Markets vending machine hack).
Statistics
Nearly 60% of firms experienced a data breach through third parties.
77% of firms have limited visibility into their third parties.
80% experienced at least one breach related to third parties in the last year.
Purpose: Decide whether and which activities should be outsourced versus kept in-house.
Consideration: Firm's risk appetite.
Purpose: Proper due diligence on new third-party relationships.
Principle: Proportionality – more complex/long-term arrangements (e.g., cloud hosting) require more extensive due diligence than short-term/less complex ones (e.g., a one-day consultant).
Purpose: Formally define responsibilities and expectations of each party.
Benefits: Reduces ambiguity, defines quality and timing, clarifies tasks and functions.
Best Practices:
Assess and remediate all open issues before signing.
Periodically review contracts and address deficiencies.
Establish limits on outsourcing to third and fourth parties.
Include audit rights on vendors for continuous monitoring.
Example: Adapting contracts for offshore call centers during COVID-19 to allow remote work.
Stage 4: Ongoing Monitoring
Purpose: Continuously assess third-party and outsourced relationships.
Efficiency: Robust earlier stages reduce the need for frequent reassessment.
Triggers for Reassessment:
Data breaches and incidents
Legal or regulatory changes
Changes in business circumstances (mergers, acquisitions)
"Acts of God" (natural unavoidable circumstances, highlighted by COVID-19).
Benefit of Triggers: Provide an effective exit strategy.
Purpose: Manage the conclusion of third-party relationships.
Standard: Relationships typically end when contracts expire.
Good Practice:
Include a grievance period.
Define an exit strategy.
Include a termination clause allowing firms to end contracts when processes wind down, circumstances dictate, or regulations change.
Clearly define the proper transfer of intellectual property from third parties back in-house.
Q1. Establishing limits on third-party and fourth-party vendor outsourcing would be considered under which of the following third-party risk management (TPRM) steps?
A. Business model decision.
B. Remediation or termination.
C. Evaluation, risk rating, and due diligence.
D. Contracts, service level agreements, and contract management.
Explanation: D is correct.
The third phase in the life cycle of TPRM relates to contracts, service level agreements, and contract management. This phase includes establishing and defining the terms of contracts for third-party (or fourth-party) arrangements, including establishing standards or limits on outsourcing.
Q2.Which of the following tasks is not one of the life cycle stages of third-party risk management (TPRM)?
A. Business model decision.
B. Evaluation, risk rating, and due diligence.
C. Management of third- and fourth-party vendor relationships.
D. Contracts, service level agreements, and contract management.
Explanation: C is correct.
The TPRM process has five steps: (1) business model decision, (2) evaluation, risk rating, and due diligence, (3) contracts, service level agreements, and contract management, (4) ongoing monitoring, and (5) remediation or termination. Management of third- and fourth-party vendor relationships is an overall component of TPRM and not a specific life cycle stage.
There are two interesting case studies discussed in this section relating to vendor risk management:
A data breach at the bank Capital One by a former third-party vendor employee, and
Weak third-party controls at the financial services company Morgan
Stanley.
Both cases highlight the relationship between data security and TPRM.
They also illustrate that the ultimate responsibility for any risks rests with the institution using third-party vendors because that accountability is not transferable.
Q3. A key conclusion from the Capital One and Morgan Stanley case studies is that accountability for operational risk:
A. is not transferable.
B. ultimately rests with the third-party vendor.
C. ultimately rests with either the third-party vendor or subcontractor, whichever experienced the
risk control problem.
D. is a fully shared responsibility between the company using third-party vendors and the third party vendors themselves.
Explanation: A is correct.
The accountability for risk control problems rests with the company that uses third-party vendors. Although third-party vendors and subcontractors should share some of the blame for risk control breakdowns, the ultimate responsibility rests with the company that outsources its services to third parties.
Stolen Data: Data from 100 million U.S. bank customers (and many international), including 140,000 Social Security numbers and 80,000 bank accounts.
Vulnerability: Both Capital One and AWS knew about system vulnerabilities but continued to use unencrypted data, allowing immediate use of stolen data.
Reason for Fine: Failure to adequately identify and manage risks related to vendor services (e.g., moving data to the cloud with AWS) prior to the breach.
OCC Findings: Capital One had weak risk management controls and failed to detect/address vulnerabilities, even after a 2015 internal audit missed several control weaknesses.
Incident: Risk management deficiencies related to third-party vendors and the decommissioning of two wealth management business data servers.
Date of Fine: 2020.
Regulator: Office of the Comptroller of the Currency (OCC).
Failure 1: Did not properly assess and address risks related to decommissioning hardware.
Failure 2: Failed to properly assess the risk of using third-party vendors and subcontractors, and did not adequately monitor their performance.
Failure 3: Failed to maintain a proper inventory of customer data.
Fine: $60 million by the OCC.
Trigger: Morgan Stanley began notifying wealth management customers in July 2019 that disposed computer hardware still contained confidential customer data.