3rd Party Risk Management
,
Governance & Risk Management
,
Video
Experts Call for Continuous Assessments of Vendor Risk – Not Just at Onboarding
As vendor ecosystems grow in complexity, many organizations still view third-party risk management as a static assessment of vendors as they’re onboarded. But organizations often focus too heavily on upfront questionnaires of vendors and fail to track how their risk profiles may change over time.
See Also: Merging Without Mayhem: PAM Strategies that Work
“There needs to be a mindset shift from episodic reviews to continuous oversight,” said Lance Mueller, president of The Digital Trust Ecosystem. “You cannot just assess a vendor once and assume you are covered. Threat landscapes evolve, vendors change operations and new risks emerge mid-contract. It is the failure to keep watch between the onboarding and offboarding that leaves organizations exposed.”
The challenge is operationalize continuous monitoring of risk without overburdening vendors or internal teams, said Mohammad Barakat, co-chair of the ACFCS MENA Chapter. “Organizations should leverage automation and integration,” Barakat said. “By using tools that integrate with existing vendor platforms and automate risk data collection and analysis, organizations can reduce manual effort and maintain up-to-date risk profiles without frequent outreach to vendors.”
In this video interview with Information Security Media Group, Mueller and Barakat also discussed:
- Red flags to look for during vendor onboarding;
- How global conflicts and trade disruptions are reshaping vendor risk exposure;
- Techniques to detect fraudulent activity after onboarding.
Barakat has advised financial institutions, regulatory bodies and regional governments on AML/CFT frameworks, governance structures and cyber resilience. His experience extends across financial services, technology, telecommunications and international development, enabling him to bridge regulatory requirements with operational realities.
Mueller partners with thousands of organizations to aid in the communication of an accurate portrayal of their cybersecurity programs. He has extensive experience in handling third party and vendor risk.