Vendor Risk Management for Law Firms: 7 Steps to Success
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. A responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.
May 17, 2018 at 04:13 PM
11 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. This risk continues to grow as cloud-service providers gain acceptance in law firms. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.
Managing risk presented by outside vendors is simply the cost of doing business today. “Business efficiency and price are no longer the only key factors in vendor evaluation,” says John Stambelos, CEO of Stambelos Consulting and Former Director of IT at Munger, Tolles & Olson LLP. “Security must have an equal weight in the decision-making process. Your clients demand it and new regulations are emerging across multiple industries.”
For example, the New York State Department of Financial Services is considering a regulatory requirement to conduct supply chain risk assessments in 2018 that will change the landscape of how vendors will be required to provide products and services to this market. The precedent has been set and additional states and regulatory bodies will surely follow suit.
This article considers the cross-industry best practices and provides seven steps to implement a highly effective vendor risk management plan. For firms willing to incorporate these steps, the result will be an industry standard, efficient and streamlined approach to vendor risk management.
From my experience, whether you currently have a vendor risk management program in place or you are starting from scratch, the following steps will help drive management buy-in and firm-wide adoption.
|Create a Plan and Assign a Team
Data security, and specifically third-party vendor management, is no longer just an IT issue. For a security strategy to be successful, data and third-party vendor management must be part of the firm's risk assessment culture. Stakeholders throughout the firm must be held accountable to maintain and follow best practices.
A strong vendor risk management policy must include the scope of the process, the stakeholders, the final deliverable, and the communications process. Stating the objective of implementing a vendor risk management program will set the tone for the organization. In order to have the greatest impact, the tone ought to be set by senior firm leadership, ideally from those outside of IT. The policy should be defined with quantifiable minimum standards of conduct and security (e.g., weighted risk score).
Scope
Which vendors should be part of your assessment process? What assessment methodology ought to be used? How frequently should your vendors be assessed? These questions will help determine the current maturity of your vendor risk management program. If the firm lacks a formal process to evaluate these questions, then first focus on evaluating existing vendors. Then, expand your program to new or potential vendors. Be sure to incorporate contract management evaluations into your process.
Team
For the program to be successful, the vendor risk management team should consist of stakeholders across multiple functional areas of your organization. A team leader should be assigned to manage the coordination and process. Frequently, this is managed by the IT/security team or compliance. Other team members should include business unit leaders, procurement, general counsel, finance/accounting and senior leadership. After all, the firm's most senior leaders are the ones authorized to accept or reject the risks posed by third-party vendors.
|Identify all the Firms' Vendors
Developing a comprehensive list of vendors may seem like a straightforward task but certain vendors might be overlooked. Too often, firm's limit their vendor inventory to IT or IT-related vendors. The growing network of third-party vendors requires firms to expand their definition of a vendor if they are going to identify potential security risks.
- Include all third-parties that interact with your networks, components or information systems including software, hardware, and professional services (g., Document Management, Time and Billing software, E-discovery, CRM, etc.);
- Include vendors that provide physical security and support services (g., security guards, janitorial, CCTV, etc.).
Identifying all the firm's vendors can be time consuming and challenging. The program leader should work with legal, procurement, and particularly the accounting team to develop an accurate inventory. One tried and true strategy to assist in the identification of the vendors it to request a download of all payments to vendors and external parties over the last 12 months. The vendor management team should review the entire list to determine which vendors have access to firm, employee, and client data.
Categorize Vendors by Risk Tier and Criticality
Once a complete vendor inventory is compiled and each vendor has been categorized by their data access, the next step is to determine the criticality of the vendor to the firm and assign a risk tier to each vendor. The risk tier should determine the depth of the security assessment process that should be taken to assess a vendor's risk to the firm.
Categorizing your vendors by risk tier should be more science and less art. The vendor management team should develop a list of critical questions for each vendor designed to evaluate how they mitigate risk and then assign a weight to each question to help determine a vendor's risk tier. This process ensures consistency across all your vendors during the audit or assessment process. The vendor management team ought to consider the following questions:
- Will the firm store sensitive client or firm data on the vendor's systems?
- Will the vendor have access to any firm or client data?
- Will the vendor hold or have access to firm or client intellectual property or other data that could result in significant harm if stolen?
- If this vendor suffers a data or privacy breach, would that trigger any reporting obligations either to clients, the public or insurance carriers?
- Would a breach of this vendor necessitate the activation of the firm's Incident Response Plan or cause the firm to activate its business continuity or disaster recovery program?
- Would a failure of this vendor's systems or processes cause a significant impact to the firm's (or its clients') business processes or interrupt the firm's revenue stream?
Risk Tier 1 vendors should be classified as your organization's business and mission critical vendors that have the greatest access to your organization or clients' sensitive data. Vendors in your tier 1 category must receive your most comprehensive security assessment. Expect to conduct rigorous inquiries into each of these vendors' policies, procedures, and network architecture.
Risk Tier 2 vendors should be classified as your organization's medium risk vendors. Vendors in your tier 2 category should receive a less exhaustive security assessment compared to the tier 1 assessment. The tier 2 assessment should still request questions covering the main risk categories, but your objective is to identify vendors' policies, procedures, and architecture.
Risk Tier 3 vendors should be classified as your organization's low risk vendors. Vendors in your tier 3 category should receive a more focused security assessment compared to the tier 2 assessment. These vendors don't have the same access to organization or clients' data, but your tier 3 questions should still assess the main risk categories. Even though these vendors lack the same access to your firm's data as tier 1 and tier 2 vendors, it is still important to understand the controls in place designed to protect your firm from risk.
|Create a List of Questions for Each Vendor Tier
Develop a security assessment methodology designed to evaluate your firm's tolerance to risk, regulatory requirements and best practices. A security assessment can be developed using industry standard frameworks (e.g., NIST, ISO, CIS, etc.) as guidelines, but it should evaluate key areas of risk depending on the type of vendor and their access to your firm's data. Initially, the assessment should be created for tier 1 vendors which are business and mission critical. Then, tailor questions for lower tiers based on vendor criticality.
Key areas of risk your firm should evaluate include:
- Asset Management
- Information Security Policy
- Human Resources
- Risk Assessment
- Vendor Management
- Physical & Environmental Security
- Identity and Access Management
- Security Awareness Training
- Data Loss Prevention
- Change and Configuration Management
- Vulnerability Management
Distribute Security Assessment to Vendors and Review Results
Distributing the security assessments to vendors and scoring results is the key to implementing a successful vendor risk management program. Implementing and formalizing your program allows you to leverage data to develop an auditable and contractible repository of risk information.
The security assessment methodology will provide you with a comprehensive analysis of policy, risk and vendor risk mitigation procedures. Each question should be reviewed and evaluated independently to identify potential security gaps, risks, and vulnerabilities. Once you have reviewed the results, implementing a risk mitigation plan for potential risks with deadlines tied to your terms and conditions will be critical.
Discuss the results with the vendors and relate any problems or concerns. Transparency is essential if you hope to develop a strong relationship and a culture of security with your vendors. Communicating any proposed solutions or acceptable mitigation measures — along with a specific deadline — will be mutually beneficial.
|Address Any Identified Risks in the Contract Terms and Conditions
Once the results of a security assessment are reviewed by the vendor risk management team, the results and any mitigating factors should be shared with the general counsel's office. It is important to tie a vendor's risk mitigation plan of action with specific dates for compliance. Contract Terms and Conditions should include:
- Remediation timelines and methodologies for identified security risks;
- Communication process and accountability for breaches (Breach Notification);
- Employee and subcontractor vetting (background checks) and data access rights management policy;
- Maintain minimum insurance requirements including General Liability, Cyber Liability, and Errors and Omissions;
- Patch update notification requirements before deployment; and
- Right to Audit Clause.
Monitor Your Vendors
Law firms are the custodians for highly confidential data for their clients. As cloud services become commonplace in the legal industry, that data is being shared with a growing network of third-party vendors. You must take responsibility for ensuring your vendors are maintaining the same security standards and risk mitigation measures your clients are requiring from you. Technology and security risks are evolving rapidly, so continuous monitoring is critical to the assessment process. The life-cycle of the security assessment has four main steps:
- Baseline Security Assessment: Request the vendor complete the firm's security assessment to identify any areas of risk;
- Security Reassessment: Complete annual or semi-annual reassessments based on vendor access and risk profile;
- Real-Time Critical Updates: Distribute ad-hoc assessments based on industry incidents (g., Meltdown and Spectre) to identify potential vulnerabilities in real-time;
- Enforce Audit Clauses Included in Your Terms and Conditions: Review additional documentation on security controls to validate assessments or conduct an on-site audit.
Conclusion
Implementing a vendor risk management program is a critical component of a comprehensive security strategy. As previously mentioned, maintaining a comprehensive third-party vendor risk management program and a detailed security assessment process is the cost of doing business today. As the buyer, owner, or custodian of highly confidential data, law firms have a unique responsibility to their clients to maintain the highest levels of protection for the sensitive information in their care.
Following these steps will ensure transparency throughout the value chain from client to law firm to vendor. Set a policy, stick with it, and communicate to all stakeholders. Because terms and conditions with each vendor can vary, your security assessment process should be tailored to each vendor's access to data and risk to your law firm.
*****
Ishan Girdhar is the CEO and founder of Privva, a cloud-based platform that streamlines the data security assessment process throughout value chain. Prior to starting Privva, Ishan's experience included corporate strategy, business development, and investment banking including working for the Walt Disney Corporation in their corporate strategy and business development team.
***
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View All5 Ways Small and Midsize Law Firms Can Win More Pitches (and Improve Realization Rates)
UTMs: Taking Your Social Media Analysis to the Next Level
Trending Stories
Who Got The Work
Dechert partners Andrew J. Levander, Angela M. Liu and Neil A. Steiner have stepped in to defend Arbor Realty Trust and certain executives in a pending securities class action. The complaint, filed July 31 in New York Eastern District Court by Levi & Korsinsky, contends that the defendants concealed a 'toxic' mobile home portfolio, vastly overstated collateral in regards to the company's loans and failed to disclose an investigation of the company by the FBI. The case, assigned to U.S. District Judge Pamela K. Chen, is 1:24-cv-05347, Martin v. Arbor Realty Trust, Inc. et al.
Who Got The Work
Arthur G. Jakoby, Ryan Feeney and Maxim M.L. Nowak from Herrick Feinstein have stepped in to defend Charles Dilluvio and Seacor Capital in a pending securities lawsuit. The complaint, filed Sept. 30 in New York Southern District Court by the Securities and Exchange Commission, accuses the defendants of using consulting agreements, attorney opinion letters and other mechanisms to skirt regulations limiting stock sales by affiliate companies and allowing the defendants to unlawfully profit from sales of Enzolytics stock. The case, assigned to U.S. District Judge Andrew L. Carter Jr., is 1:24-cv-07362, Securities and Exchange Commission v. Zhabilov et al.
Who Got The Work
Clark Hill members Vincent Roskovensky and Kevin B. Watson have entered appearances for Architectural Steel and Associated Products in a pending environmental lawsuit. The complaint, filed Aug. 27 in Pennsylvania Eastern District Court by Brodsky & Smith on behalf of Hung Trinh, accuses the defendant of discharging polluted stormwater from its steel facility without a permit in violation of the Clean Water Act. The case, assigned to U.S. District Judge Gerald J. Pappert, is 2:24-cv-04490, Trinh v. Architectural Steel And Associated Products, Inc.
Who Got The Work
Michael R. Yellin of Cole Schotz has entered an appearance for S2 d/b/a the Shoe Surgeon, Dominic Chambrone a/k/a Dominic Ciambrone and other defendants in a pending trademark infringement lawsuit. The case, filed July 15 in New York Southern District Court by DLA Piper on behalf of Nike, seeks to enjoin Ciambrone and the other defendants in their attempts to build an 'entire multifaceted' retail empire through their unauthorized use of Nike’s trademark rights. The case, assigned to U.S. District Judge Naomi Reice Buchwald, is 1:24-cv-05307, Nike Inc. v. S2, Inc. et al.
Who Got The Work
Sullivan & Cromwell partner Adam S. Paris has entered an appearance for Orthofix Medical in a pending securities class action arising from a proposed acquisition of SeaSpine by Orthofix. The suit, filed Sept. 6 in California Southern District Court, by Girard Sharp and the Hall Firm, contends that the offering materials and related oral communications contained untrue statements of material fact. According to the complaint, the defendants made a series of misrepresentations about Orthofix’s disclosure controls and internal controls over financial reporting and ethical compliance. The case, assigned to U.S. District Judge Linda Lopez, is 3:24-cv-01593, O'Hara v. Orthofix Medical Inc. et al.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250