The Cost of Third-Party Cybersecurity Risk Management

1 minute read

March 2019

by cybergrx

Third parties are inundated with assessments and enterprises aren’t getting the insights they need – and the cost of failure is high.

In the past two years, 82% of organizations have experienced one or more data breaches caused by a third party, costing an average of $7.5 million to remediate.

80%80%

of organizations believe vetting third parties is critical. However, 60% of organizations believe they are only somewhat or not effective at vetting third parties.

Third parties spend 15,000+ hours completing assessments each year

Enterprises only take action on 8% of the assessments they receive.

Retail & Financial Services

Reported the most third-party breaches, despite the fact that their third parties spend more than 16,500 hours a year filling in manual assessments.

Health & Pharma

are most likely to use a combination of tools to assess their third parties and less likely to have a third-party breach.

40%

of organizations use manual procedures like spreadsheets and 51% employ risk scanning tools to vet their third parties.

Over 54%

of respondents said the results of these tools provide, at best, only somewhat valuable information.

The cost of failing to vet and evaluate third parties effectively is $13,000,000 (costs include potential impact on reputation and brand, decreases in share value, loss of business, etc.)

Related Articles

About Us

ProcessUnity is the Third-Party Risk Management (TPRM) company. Our software platforms and data services protect customers from cybersecurity threats, breaches, and outages that originate from their ever-growing ecosystem of business partners. By combining the world’s largest third-party risk data exchange, the leading TPRM workflow platform, and powerful artificial intelligence, ProcessUnity extends third-party risk, procurement, and cybersecurity teams so they can cover their entire vendor portfolio. With ProcessUnity, organizations of all sizes reduce assessment work while improving quality, securing intellectual property and customer data so business operations continue to operate uninterrupted.