Prioritizing vendors based on risk is considered a vendor risk management best practice. But how do you do this? To start, let’s look at a commonly referred-to equation:
Risk = Threat x Vulnerability x Consequence
While this risk equation may be helpful in some ways, it’s also tough to use. Why? Because it’s extremely difficult—if not impossible—to assign a value to threat and vulnerability. Most organizations should assume a high level of threat and vulnerability, no matter what. (So, if you are assuming each variable in this equation is assigned a value between zero and one, threat and vulnerability would both have a value of one.) Simply put, there will always be individuals with malicious intentions who may target your organization, who can exploit common vulnerabilities in your IT systems. It’s hard to do much to change this reality.
That leaves the final part of the equation: consequence. The difference here is that you know the consequence to you if a vendor is knocked offline for a number of days, or if your data is somehow compromised or stolen due in part to one of your vendors. Because of this, you can assign a value to consequence. By understanding the consequence of a cyber incident affecting your vendors, you can truly begin to focus your vendor risk management program on those organizations that are most critical to you and adopt vendor management best practices.
All of this begs a simple question: “What should I be doing to make my vendor management practices a little more focused on risk?”. Below, we’ve outlined five critical best practices that your organization can get started with today.
Building a successful vendor risk management (VRM) program requires you to focus your resources and energy on the third parties who are truly consequential to your organization. To find these vendors, think about where your most important data and technology dependence resides. By following these steps, you can be prepared for whatever comes your way.
We've drilled down into areas that vendor risk management programs leave a little vague.
Download the guide to see if you've considered these critical areas of vendor risk management.
Data breaches that originate through third parties are more commonplace than organizations are used to. The SolarWinds hack and Kaseya ransomware attack are two recent examples of threat actors exploiting the security practices of...
Organizations rely on third-parties to keep competitive in the marketplace. The EY global third-party risk management survey highlights that in 2019–20, over 33% of the 246 global companies surveyed were managing and monitoring third-party...
Third parties are essential to helping your business grow and stay competitive. But if you’re not careful, your trusted partnerships can introduce unwanted cyber risk and overhead into your organization.
© 2026 BitSight Technologies. All Rights Reserved. | Privacy Policy | Security | For Suppliers
Contact Us | BitSight Technologies | 111 Huntington Ave, Suite 2010, Boston, MA 02199 | +1-617-245-0469