Industries

Helping clients meet their business challenges begins with an in-depth understanding of the industries in which they work. That’s why KPMG LLP established its industry-driven structure. In fact, KPMG LLP was the first of the Big Four firms to organize itself along the same industry lines as clients.

How We Work

We bring together passionate problem-solvers, innovative technologies, and full-service capabilities to create opportunity with every insight.

Learn more

Careers & Culture

What is culture? Culture is how we do things around here. It is the combination of a predominant mindset, actions (both big and small) that we all commit to every day, and the underlying processes, programs and systems supporting how work gets done.

Learn more

Third-Party Security Findings Management

Industry leading practices to strengthen your partnership with suppliers while securing the broader ecosystem

Cyber Security Services

Findings Management is a Core Challenge

Working with third parties to remediate findings identified in their systems and processes is a key challenge for many organizations. Programs often have defined methodologies for assessing the risk posed by findings so they can be prioritized for remediation. However, because it has been difficult to identify leading industry practices, these processes can feel imprecise or even arbitrary both within organizations and to their third parties. This frequently leads to lack of third-party cooperation with the remediation process, in addition to a general sense of uncertainty regarding the efficacy of risk management activities.

A Risk-Based Framework

For this reason, it is a top priority to determine identifiable industry leading practices for findings management. While slight variations exist in terms of naming conventions and risk segmentation method, almost all leading third-party security programs adhere to a consistent approach for assessing the risk posed by findings so they can be assigned a required timeframe for remediation. In general, the risk posed by a finding is made up of two components: exploitation severity and control relevance to the vendor environment. 

In this way, leading organizations determine the criticality of a finding first by determining the impact to the organization which would result from exploitation. In other words, this component seeks to answer the question ‘how much could exploitation of this vulnerability hurt me based on the relationship my organization has with the third-party?’ The other core component assesses the interdependency between the specific control and the vendor’s broader information security posture: ’how much could exploitation hurt the third-party’s systems?’

Findings are then segmented into discrete categories based on the criticality criteria to prioritize mitigating effort. In general, high findings are classified as those which represent both high exploitation severity as well as control relevancy. These often must be remediated within 30 days to minimize risk exposure. On the other hand, if both severity and relevancy pose a low risk, remediation can be addressed over a longer timeframe, frequently set at 90 days. For findings in between representing a medium level of risk, in general 60 days is the required timeframe for remediation.

Partnership Building and Cascading Value

To obtain the most value from the findings management process, industry leading organizations are integrating it into broader third-party risk management efforts. Based on a specific third-party’s findings history, assessments can be scoped to ‘right-size’ assurance requirements and target specific control areas. Similarly, when it comes to ongoing monitoring, finding records are utilized to drive requirements, with third parties showing a consistent track record of control implementation being deprioritized. Finally, trends based on third-party type, product category, and other key features are identified to inform a proactive risk management approach.

Implementation of a robust third-party findings management process drives benefits beyond individual organizations to the broader third-party ecosystem. Third-party Information Security programs can utilize routine participation in assessment and findings remediation processes to ensure they are evolving along with the threat landscape. Broad application of remediation requirements encourages consistent adherence to industry standard configurations, improving overall security throughout the supplier ecosystem. Additionally, routine cooperation between organizations and their third parties to perform cybersecurity assessments can drive overall service and partnership quality improvements. In this way, the findings management process can evolve from a challenge to a key source of value to the organization, its third parties, and broader cyber ecosystem. 

Cyber security in the new reality

Working together to respond to the challenges.

Meet our team

Image of Mitushi Pitti
Mitushi Pitti
Managing Director, Cyber Security Services, KPMG US

Thank you!

Thank you for contacting KPMG. We will respond to you as soon as possible.

Contact KPMG

Use this form to submit general inquiries to KPMG. We will respond to you as soon as possible.

By submitting, you agree that KPMG LLP may process any personal information you provide pursuant to KPMG LLP's Privacy Statement.

An error occurred. Please contact customer support.

Job seekers

Visit our careers section or search our jobs database.

Submit RFP

Use the RFP submission form to detail the services KPMG can help assist you with.

Office locations

International hotline

You can confidentially report concerns to the KPMG International hotline

Press contacts

Do you need to speak with our Press Office? Here's how to get in touch.

Headline