Identifying and mitigating third-party IT risks

Drazen Zigic/GettyImages

Connect with state & local government leaders
 

Connecting state and local government leaders

COMMENTARY | Transparency, accountability and collaboration with vendors can help agencies reduce the risks associated with third-party contracting.

Having just started a new job as chief technology officer at a well-run large county, it did not take the new CTO long to realize that one cloud service provider was not performing as expected. Once it became clear the business relationship was deteriorating, it was time for the county to find a new vendor. Identifying a new and more suitable cloud vendor was the easy part, but getting the former vendor to migrate all the county’s data became a monumental hurdle. The vendor said there was no problem returning the data but warned it would be unrecognizable and would cost over $2 million to convert it into a usable format. How could this be?

Years before, the cloud contract was signed under different staff leadership. And for a good deal of time, all seemed fine. But when a far more experienced pair of eyes reviewed all previously signed contracts it became apparent that the previous CTO’s inexperience, lack of oversight and unintended negligence was going to be expensive.      

In another instance of mismanagement, a CIO bragged how he got a great deal from his vendor to store all public safety body-worn camera data for three years at no cost. Everyone in the room was surprised, but they were even more surprised that the CIO lacked an answer as to what might happen in year four. Regardless of the lure of “free,” there is always a cost somewhere. 

IT vendor relations have gone through numerous phases over the years. The recent pandemic brought about the most significant shift in decades, with vendors bending over backward to help state and local governments shift almost overnight to a remote and virtual environment. This profound cooperation continues to this day as hurricanes, flooding and wildfires have wreaked havoc across the nation—and once again, the vendor community has stepped up in heroic and selfless ways. Emergencies and disasters require different sets of skills, expectations, and contractual relationships than day-to-day operations. However, when all returns to “normal,” it is back to working under negotiated contracts and agreements. 

Sound contracts and agreements are good for all sides, and the responsibility for negotiating a sound agreement rests with the governmental entity. Many local governments lack the required negotiating and contract management skills, not to mention advanced tech savvy required for making informed decisions about cloud, networking and artificial intelligence services. Plus, post-contract evaluations become an afterthought. This is where third-party risks come into play. 

In a local government setting, third-party vendor risks refer to the potential dangers or liabilities associated with engaging external entities to provide goods, services, or technology solutions to a government organization.

  • Identifying and mitigating third-party risks in government IT operations is crucial for maintaining data security, operational continuity and compliance with legal standards. In today’s dynamic and ever-changing tech and policy environment, third-party risks can be categorized as follows: Data security and privacy: Third-party vendors may have access to sensitive citizen data or government information. If the vendor lacks robust data and network security, it could fall victim to data breaches, unauthorized access or data leaks, violating privacy regulations and losing public trust.
  • Compliance and legal risks: Third-party vendors' failure to comply with relevant laws, regulations or contractual obligations—including industry standards, data protection laws and government procurement regulations—can expose the government to legal liabilities, fines or reputational damage. 
  • Service disruption: Reliance on third-party vendors for critical services such as IT infrastructure, software applications or utilities can pose a risk of service interruption. If the vendor experiences downtime, technical issues or operational failures, it could disrupt government operations, impacting service delivery and citizen satisfaction.
  • Financial risks: Engaging third-party vendors involves financial commitments through contracts, licensing agreements or service subscriptions. Financial risks include cost overruns, unexpected fees, vendor insolvency or contractual disputes, which can strain the government's budget and financial resources.
  • Reputational risks: Third-party vendors' actions or performance reflect on the government organization. Negative incidents such as security breaches, service outages or ethical misconduct by vendors can tarnish the government's reputation and erode public confidence in its ability to govern effectively.
  • Dependency risks: Overreliance on a single third-party vendor or a limited pool of vendors for critical services can create dependency risks. If the vendor experiences issues or fails to meet expectations, the government may face challenges in finding alternative solutions or transitioning to new vendors, leading to operational disruptions or increased costs.
  • Supply chain risks: Third-party vendors often have their own network of suppliers and subcontractors. Risks associated with the vendor's supply chain include issues such as supply chain disruptions, substandard quality of components or services, labor disputes or unethical practices, which can indirectly impact the government organization.

Understanding third-party risks upfront can lead to better overall vendor relations and contracts where there are clearly stated policies and procedures. 

But risk management goes far beyond vendor selection and contract negotiations. Beneath the surface lies vendor management and relations. Here are some effective strategies local government tech leaders can use to keep their agencies’ risk at an acceptable level.

1. Risk assessment and inventory. Many local governments lack a sound and updated asset management and inventory system. They purchase products and services as if they were buying a personal device. But in a municipal setting, having an active risk and inventory database is essential—after all, how can anyone manage what they do not know about or see? Here are some basics of the assessment:

  • Identify all third-party providers. This includes direct software and hardware vendors, subcontractors and cloud service providers.
  • Identify all hardware and software systems. This includes locations, ownership, configurations, patches and software updates. 
  • Assess the risk level. Evaluate how critical each vendor is to agency operations and what potential risks each one presents.
  • Collaborate with IT security and risk management teams to assess and categorize third-party risks during the vendor selection process.
  • Ensure that risk assessments are updated regularly to reflect changes in the vendor’s service delivery or the threat landscape.

2. Due diligence. Regardless of the rush to implement, due diligence—however time-consuming—is critical.

  • Vendor selection. Maintain a pre-approved list of vendors who meet the organization's security and compliance standards. Before engaging a third party check the company’s financial stability, security standards, compliance certifications and references. Also check the vendor’s staff turnover, which may indicate problems with internal management and contract fulfillment. 
  • Continuous evaluation. Regularly review the performance and compliance of third-party providers to ensure they meet required standards. Whether quarterly or even annually, this ensures everyone is on the same page and any variances in performance or expectations can be addressed more quickly. 
  • Change of vendors. Establish upfront rules and expectations in case vendors need to be changed. 

3. Contract management. Contract management is a continuous process and requires periodic review and auditing. 

  • Service level agreements. Ensure SLAs are comprehensive and address security, data handling, compliance and reporting. Clearly define penalties for breaches or failures.
  • Right to audit. Incorporate clauses that allow periodic audits of the vendor’s processes and security measures.

4. Security standards and controls: Regular monitoring of data and network security is essential.

  • Data security. Ensure that all third parties comply with relevant data protection laws and industry standards (e.g. HIPAA, PCI DSS, CJIS).
  • Encryption and access control. Require third parties to implement strong encryption protocols and access controls. This should include two-factor authentication. 
  • Training. Provide procurement staff with training on the latest cybersecurity threats, AI, risk management practices and compliance requirements.

Recognizing and managing third-party vendor risks requires thorough due diligence, effective contract management, monitoring and assessing vendor performance, implementing security and compliance measures, and establishing contingency plans to mitigate potential disruptions. It also involves training and fostering transparency, accountability, and collaboration between the government organization and its vendors. IT leaders need to actively address risks and uphold the public interest.  

Dr. Alan R. Shark is the Executive Director of the Public Technology Institute (PTI) and Associate Professor for the Schar School of Policy and Government, George Mason University, where he is also an affiliate faculty member at the Center for Advancing Human-Machine Partnership (CAHMP). Shark is a National Academy of Public Administration Fellow and Co-Chair of the Standing Panel on Technology Leadership. Shark also hosts the bi-monthly podcast Sharkbytes.net. Dr. Shark acknowledges collaboration with generative AI in developing certain materials.

X
This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Learn More / Do Not Sell My Personal Information
Accept Cookies
X
Cookie Preferences Cookie List

Do Not Sell My Personal Information

When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link.

Allow All Cookies

Manage Consent Preferences

Strictly Necessary Cookies - Always Active

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data, Targeting & Social Media Cookies

Under the California Consumer Privacy Act, you have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link

If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences.

Targeting cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising.

Social media cookies are set by a range of social media services that we have added to the site to enable you to share our content with your friends and networks. They are capable of tracking your browser across other sites and building up a profile of your interests. This may impact the content and messages you see on other websites you visit. If you do not allow these cookies you may not be able to use or see these sharing tools.

If you want to opt out of all of our lead reports and lists, please submit a privacy request at our Do Not Sell page.

Save Settings
Cookie Preferences Cookie List

Cookie List

A cookie is a small piece of data (text file) that a website – when visited by a user – asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies – which are cookies from a domain different than the domain of the website you are visiting – for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a “sale” of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated “sale” of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.