Besides the small introduction, subscribers and consulting clients within this management domain have access to:
Review IT vendor risk fundamentals and establish a risk governance framework.
Categorize, prioritize, and assess your vendor risks. Follow up with creating effective response strategies.
Assign accountability and responsibilities to formalize ongoing risk monitoring. Communicate your findings to management and share the plan moving forward.
Workshops offer an easy way to accelerate your project. If you are unable to do the project yourself, and a Guided Implementation isn't enough, we offer low-cost delivery of our project workshops. We take you through every phase of your project and ensure that you have a roadmap in place to complete your project successfully.
To prepare the team for the workshop.
Avoids delays and interruptions once the workshop is in progress.
1.1 Send workshop agenda to all participants.
1.2 Prepare list of vendors and review any contracts provided by them.
1.3 Review current risk management process.
All necessary participants assembled
List of vendors and vendor contracts
Understanding of current risk management process
Review IT vendor risk fundamentals.
Assess current maturity and set risk management program goals.
Engage stakeholders and establish a risk governance framework.
Understanding of organizational risk culture and the corresponding risk threshold.
Obstacles to effective IT risk management identified.
Attainable goals to increase maturity established.
Understanding of the gap to achieve vendor risk readiness.
2.1 Brainstorm vendor-related risks.
2.2 Assess current program maturity.
2.3 Identify obstacles and pain points.
2.4 Develop risk management goals.
2.5 Develop key risk indicators (KRIs) and escalation protocols.
2.6 Gain stakeholders’ perspective.
Vendor risk management maturity assessment
Goals for vendor risk management
Stakeholders’ opinions
Categorize vendors.
Prioritize assessed risks.
Risk events prioritized according to risk severity – as defined by the business.
3.1 Categorize vendors.
3.2 Map vendor infrastructure.
3.3 Prioritize vendors.
3.4 Identify risk contributing factors.
3.5 Assess risk exposure.
3.6 Calculate expected cost.
3.7 Identify risk events.
3.8 Input risks into the Risk Register Tool.
Vendors classified and prioritized
Vendor risk exposure
Expected cost calculation
Determine risk threshold and contract clause relating to risk prevention.
Identify and assess risk response actions.
Thorough analysis has been conducted on the value and effectiveness of risk responses for high-severity risk events.
Risk response strategies have been identified for all key risks.
Authoritative risk response recommendations can be made to senior leadership.
4.1 Determine the threshold for (un)acceptable risk.
4.2 Match elements of the contract to related vendor risks.
4.3 Identify and assess risk responses.
Thresholds for (un)acceptable risk
Risk responses
Communicate top risks to management.
Assign accountabilities and responsibilities for risk management process.
Establish monitoring schedule.
Risk monitoring responsibilities are established.
Transparent accountabilities and established ongoing improvement of the vendor risk management program.
5.1 Create a stakeholder map.
5.2 Complete RACI chart.
5.3 Establish the reporting schedule.
5.4 Finalize the vendor risk management program.
Stakeholder map
Assigned accountability for risk management
Established monitoring schedule
Risk report
Vendor Risk Management Program Manual