The Network and Information Security Directive 2 (NIS2) is an E.U. cybersecurity directive enacted in December 2022. NIS2 mandates that critical, essential, and important services to the economy and society secure their operations and supply chains against cyber-attacks.
The NIS2 Directive includes specific recommendations and requirements for organizations to manage third-party risks effectively. Part of the Mitratech Enterprise Risk Management Platform, the Prevalent TPRM solution automates the assessment, monitoring, and management of third-party risks in concert with your broader cybersecurity and enterprise risk management program to help address critical infrastructure risks noted in NIS2.
Develop a comprehensive framework for managing third-party risks.
Include clear, enforceable cybersecurity requirements in contracts with third parties.
Regularly assess the effectiveness of third-party risk management measures and adapt them as necessary to address evolving threats.
Conduct thorough due diligence and risk analyses to identify potential vulnerabilities introduced by third parties.
Develop clear procedures for managing incidents that involve third parties.
Align Your TPRM Program with 14 Industry Standards
Download this guide to review industry standards with specific TPRM requirements, and discover best practices for simplifying compliance.
How Mitratech Helps Address NIS2 Third-Party Risk Management Requirements
NIS2 Directive | Mitratech TPRM Capability |
---|---|
Establish comprehensive policies that address security-related aspects concerning relationships with direct suppliers and service providers. This includes assessing the security posture of third parties and ensuring they adhere to appropriate cybersecurity standards. |
Mitratech TPRM experts collaborate with your team to define and implement TPRM frameworks, strategies, processes and solutions in the context of your overall risk management approach; selecting risk assessment questionnaires and frameworks; and optimizing your program to address the entire third-party risk lifecycle – from sourcing and due diligence to termination and offboarding. As part of this process, the Mitratech team will help you define:
|
Conduct thorough due diligence and risk analyses to identify potential vulnerabilities introduced by third parties. This involves evaluating the criticality of third-party services and their potential impact on the organization's operations. Evaluate third party cybersecurity posture, compliance with industry standards, and incident response capabilities. Classify vendors based on their criticality to operations and potential risk impact. |
The Prevalent solution helps to quantify inherent risks to effectively tier and categorize suppliers based on criticality, set appropriate levels of further diligence, and determine the scope of ongoing assessments. Criteria used to calculate inherent risk for supplier tiering can include:
Once tiering and categorization are complete, the Prevalent solution enables you to leverage a standardized NIS2 risk assessment, or any other of our more than 800 assessment templates to determine adherence to key third-party risk management principles. With the Prevalent solution, you can incorporate the due diligence assessment results into our central third-party risk management platform, and use workflow automations, task management, and automated evidence review capabilities to evaluate risk scores. |
Have clear procedures for managing incidents that involve third parties. This includes timely detection, response, and reporting of incidents to relevant authorities, ensuring that third-party incidents are managed with the same rigor as internal ones. |
As part of your broader incident management strategy Prevalent ensures that your third-party incident response program enables your team to rapidly identify, respond to, report on, and mitigate the impact of third-party vendor security incidents. Key capabilities include:
The Prevalent solution also includes databases that contain several years of data breach history for thousands of companies around the world – including types and quantities of stolen data; compliance and regulatory issues; and real-time vendor data breach notifications. |
Regularly assess the effectiveness of their third-party risk management measures and adapt them as necessary to address evolving threats. |
Continuously track and analyze external threats to third parties with the Prevalent TPRM solution. With Prevalent, you can monitor the Internet and dark web for cyber threats and vulnerabilities, as well as public and private sources of reputational, sanctions and financial information. Monitoring sources include:
All monitoring data is correlated with assessment results and centralized in a unified risk register for each vendor, streamlining risk review, reporting, remediation and response initiatives. Once all assessment and monitoring data is correlated into the central risk register, apply risk scoring and prioritization according to a likelihood and impact model. This model frames risks into a matrix, so you can easily see the highest impact risks and can prioritize remediation efforts on those. Then, assign owners and track risks and remediations to a level acceptable to the business. |
Include clear, enforceable cybersecurity requirements in contracts with third parties. |
The Prevalent solution enables organizations to centralize the distribution, discussion, retention and review of vendor contracts to automate the contract lifecycle and ensure key clauses are enforced. Key capabilities include:
Continually evaluate the effectiveness of your TPRM program according to changing business needs and priorities, measuring third-party vendor key performance indicators (KPIs) and key risk indicators (KRIs) through the relationship lifecycle. With this capability, you can ensure that clear responsibilities and right-to-audit clauses are articulated in the vendor contract, and SLAs tracked and managed accordingly. |
The EBA Guidelines set out the internal governance arrangements that credit, payment, and electronic money institutions...
Mitigate privacy risks and comply with GDPR requirements by assessing third-party data protection controls with these...
With compliance mandated by January 2025, now is the time for organizations to examine their third-party...