NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
February 15, 2019

How Vendor (3rd Party) Security Assessments Can Help You Build a Better Security Program

Justin Fimlaid Justin Fimlaid

Are you thinking about Vendor (3rd Party) Security Assessments? Aspirations to build onto your Vendor Security Assessment program? Why wouldn't you -- you go through all the effort to secure your own business or corporation only to send you data to a trusted third party to have them lose your data for you. Or better yet, your Vendor gets breached and they become a pivot point which bad-guys can hop onto your network -- case in point, the famous Target breach.

Vendor Security Assessments are usually an area for improvement for most security shops. However those same security shops barely have enough security bodies to put out internal fires never mind assessing the security posture of Vendors. Because of this I often see Vendor Security Assessments passed over by Security teams or they only conduct a "kick the tires" type of assessment.

Vendor (3rd Party) Security Assessments are very important and more importantly they help you build a better enterprise security program. Here's how they help you build a better Security Program:

  1. Vendor Security Assessments are best done BEFORE you establish a vendor relationship. Once your vendor has a signed contract and they are connected to your network or sharing data it's going to be very hard to get them to self-select the correct security behaviors especially if security investment is involved. In order to do a Vendor Security Assessment before a vendor relationship is established, a Security team should be establishing relationships with their business peers so that their business peers will include Security during business and contract negotiations. Often this an opportunity to ensure your vendors make the proper security investments and are good custodians of your data BEFORE a contract is signed. This is a fantastic way to drive awareness of security throughout the company and help to establish relationships to push the security agenda forward.
  2. Vendor Security Assessments get people talking about risk management.  If you've done a security assessment before you know there are always findings, sometimes those findings are cost prohibitive for your vendor to fix but you still need them to do business. This gets people talking about risk, finding a common definition of risk, and discussing how much risk they'd accept in order to do business. If the Security is tied into your Enterprise Risk Management Program (and it should be), the practice of talking about risk will absolutely up-level the quality of Enterprise Risks once you give everything time to soak in.
  3. Security Assessments always have findings.  If you are doing Vendor Security Assessments you should be conducting some remediation activities and following up to make sure your vendors remediate security deficiencies.  This is good for a couple reasons - namely it lets your vendors know your company takes security seriously, it's also a good practice for Security staff to work on various soft-skills that make them great Security Operators.
  4. Vendor Security Assessments can be complex. Conducting security assessments of vendors and partners can be very involved, and no matter how mature of checklist you have there's always a twist or interpretation required for a security control.  This makes for stronger in-house Security Analysts or Security Engineers, and when the time comes for them to assess internal designs, or submit security requirements they will be more proficient at the task from having extensive Vendor Security Assessment experience.

Vendor Security Assessments are hard to do well. Let's face it -- in most cases your Security needs to get out in front of fast moving business peers who have their own business goals and don't want to slow down or wait for a Security Assessment of the Vendor and any remediation time. For small Security teams in large organizations, this is a kin to chasing a bear with a bb gun.  At the end of the day, the most important thing is that you look at the Security of your vendors and partners--they can lose your data, violate your privacy policy, and violate your compliance standing. To do this right means you're driving awareness within your organization to self-select the correct security behaviors and developing your internal staff so they can do the other parts of their job better.

If you need help with Vendor Assessments NuHarbor Security has solutions to help!  https://nuharborsecurity.com/vendor-assessments

Included Topics

  • Security Testing
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 2 min read
LockPath and NuHarbor Security to Host Series on Building Modern Risk and Security Program Read More
Compliance 3 min read
Meet Knox: NuHarbor Security’s Certification Program Read More
Cybersecurity Technology 1 min read
3 Ways to Cure a Security Shelfware Hangover Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.