Managing third-party risk can be challenging — especially when you’re strapped for time and resources. This free third-party risk management resources kit simplifies the process with essential tools and resources you’ll need to identify, prioritize, and mitigate third-party risk, including policy templates, checklists, and more.
A third-party risk management policy establishes controls and processes for managing security risks that are introduced by third parties. Use this template to help build a solid foundation for managing your third-party relationships, whether you’re creating a third-party risk management policy for the first time or looking to strengthen your current policy.
What's included:
A vendor risk management program should put formalized processes in place for managing risk throughout the entire vendor lifecycle, from vendor risk assessments to continuous monitoring. Follow these steps to to implement an effective vendor risk management program at your organization.
What’s included:
A supply chain risk management policy is designed to define and support the protection and controls of supply chain procedures and processes. Download this customizable policy template to build out your policy library.
What’s included:
Risk assessment is a process for identifying risks to organizational operations, assets, and individuals and assessing the likelihood they will occur and the harm that would arise if they did occur. Use the template below as a starting point for assessing risks. It is tailored for non-adversarial risk, but you can use it to assess adversarial risk by replacing “range of effects” with “threat source characteristics.”
What’s included:
A business continuity plan can help assist an organization in resuming operations and services as quickly as possible during a crisis. Use this template to begin identifying the risks, critical elements, mitigation actions, and preparedness strategies that will make up the basic components of your business continuity plan.
What’s included: