

Raise your hand if you’ve ever received an email or letter in the mail from a business who communicated “they have been breached, and your information was exposed.” This is known as second-party risk and odds are most of us have experienced this.
On the other side of that business, are third-party relationships. Those are direct with vendors and suppliers they use to provide their products and services. Beyond that are the indirect fourth and fifth-party relationships associated to the third-party vendors and suppliers. If you are unlucky like me, you may have also received letters from businesses, informing you that their third-party was breached and your information was compromised. In either case there is not much recourse we have other than to no longer use the business, which can have a detrimental effect.

Unfortunately, in today’s digital world business are using more third-party’s than ever before. In the 2025 Verizon Data Breach Investigation Report, they stated 30% of breaches were linked to third-party involvement. That was double from 2024. Risks that were once largely based on geography, resource constraints, or business continuity, have progressed into risks of privacy and data processing, regulatory compliance, and cybersecurity. One of the biggest challenges for third-party risk management is finding someone to manage it!
Ownership can often be across three different business units. Legal manages the vendor contracts and terms, while procurement handles the purchase and service level agreements, and IT/Security validates their posture to safely fulfill business objectives. This can be a lot of cooks in the kitchen and if not communicated well, a recipe for disaster.
There are three maturity levels of Third-Party Risk Management (TPRM):

Potential Consequences of Un-Managed Third-Party Risk
Many teams already have full plates, and it can be a struggle to take on one more tool or get budget for another solution. However, as previously mentioned the number of third-party vendors the business relies on to meet their objectives is only growing. So that risk is going up, not down. Let’s get into some of these concerns attributed to third-party risk.
This is a large market, comprised of many GRC solutions offering a TPRM module and various point solutions with differing degrees of product maturity and features.
You may already know third-party risk management for its vendor exposure ratings, security trend timeline, alerting to vendor changes, and sending of questionnaires.
But there are many capabilities you may not be aware of. Here are several that work towards enhancing your TPRM posture.
| Access Inventory | Record all areas of access the vendor has to your environment, policies, and data. Aligning to associated owners on both sides of relationship. |
| Central Repository | Store all vendor information with ownership and communication procedures in one place – contract repository, response plans, SLAs, and liability information. |
| Fourth and Fifth-Party Visibility | Understand the breadth of connections and health of your third-party vendor’s associated business chain. |
| Exposure Detection | Visibility into vendor breaches, unaddressed critical CVE’s, zero-day attacks that affect your vendors. Detect issues in vendors connected to you and what in your domain could be affected. |
| Zero-Day/Incident Questionnaires | Ability to bulk send questionnaires to vendors to understand their level of impact when a novel attack or impacting incident occurs. |
| Automate SOC2 Reviews/Questionnaires | Evaluate a vendors SOC2 report or have it populated into your questionnaire. Upload your compliance and business reports to automatically populate questionnaires you receive. |
| Vendors/Suppliers Dependencies | Recognize the concentration in volume of work and services associated to your vendors, which may increase potential risks if not diversified. |
| Renewal & Questionnaire Tracking | Workflows for upcoming renewals and questionnaire requests. |
| Trust Center | Offers a secure link with repository to share your businesses control and governance files – audit and compliance, privacy policy, etc. with vendors to expedite the onboarding process. |
| Financial Impact | Ratings for potential losses in working with vendors, calculated by FAIR and vendor posture. |
| Compliance Mapping | Vendors who supply information – AI scans files to complete mapping. Unresponsive vendors – AI pulls from Open Source Intelligence, public polices, and external controls from cyber ratings to align with frameworks and build compliance profile. |
There are a lot of solution options and ways you can leverage TPRM tooling. Here are our top considerations:
We are here to help you navigate all the features, options, as well as services or managed services if it’s too much for your teams to take on. Please reach out to hello@sayers.com and we would be happy to assist.