NAVIGATING SUPPLY CHAIN CYBER RISK
IN PERSON COURSE
JANUARY 13 -16, 2026
This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.

TPRM Certification
Based on our best selling book
Navigating Supply Chain Cyber Risk
4 Day Certification Course

We provide all the knowledge, tools and methodologies to create a TPRM program or enhance your exeisting one!
Part 1 – Introduction to Vendor Cyber Risk Management. Provides context and introduces the foundational elements of cybersecurity vendor risk management, types of vendors, know your supply chain, and case studies and in 4 sessions.
Part 2 – Vendor Related Cyber Regulations. Part 2 focuses on the multiple types of cyber regulations related to vendors, challenges and frameworks used in eight sessions.
Part 3 – Building an Effective Vendor Cyber Risk Management Program. Part 3 focuses on preparation, risk assessment, due diligence, Vendor Risk Modeling, Auditing and Certification and risk scoring and policies and procedures in eight sessions.
COURSE DETAILS
Frequently asked questions
Objectives
By the end of this session, participants will be able to:
Define key terms in Third-Party Risk Management (TPRM).
Differentiate between types of risks and vendor categories.
Understand how terminology ties into frameworks, regulations, and practice.
Use a consistent vocabulary when engaging vendors, regulators, and internal stakeholders.
Session Breakdown (45 minutes)
1. Introduction to TPRM (5 minutes)
What is TPRM?
Why terminology matters (consistency, contracts, regulatory alignment).
High-level view: vendor ecosystem and risk lifecycle.
2. Core Terminology (15 minutes)
Key Terms to Define:
Third Party vs. Fourth Party (direct vendors vs. subcontractors).
Vendor Risk vs. Supply Chain Risk.
Due Diligence (initial assessment of a vendor’s risk posture).
Ongoing Monitoring (continuous risk evaluation).
Inherent Risk vs. Residual Risk.
Risk Appetite vs. Risk Tolerance.
Control Environment (policies, processes, technologies).
Critical Vendor vs. Non-critical Vendor.
Material Risk vs. Immaterial Risk.
(Examples provided for each term — e.g., “cloud provider storing PHI = critical vendor.”)
3. Regulatory & Standards Terminology (10 minutes)
NIST CSF / NIST AI RMF (risk categories).
ISO 27001 / 42001 (information security & AI governance standards).
SOC 2 (Trust Service Criteria: security, availability, confidentiality, integrity, privacy).
DORA (Digital Operational Resilience Act).
FFIEC, OCC, HIPAA, GDPR terms related to vendor oversight.
SIG (Standardized Information Gathering Questionnaire).
4. Risk Categories in TPRM (10 minutes)
Introduce the “language of risk” used in assessments:
Information Security Risk
Operational Risk
Compliance/Regulatory Risk
Financial Risk
Reputational Risk
Concentration Risk (over-reliance on one vendor).
Geopolitical/ESG Risk
Provide mini case studies (e.g., vendor breach → reputational & compliance risk).
5. Wrap-Up & Q&A (5 minutes)
Recap top 10 TPRM terms.
Provide a glossary handout.
Open floor for questions.
Session Aids
Slides with glossary definitions.
Visual: TPRM lifecycle (onboarding → monitoring → offboarding).
Case study example (vendor breach scenario).
Handout: “TPRM Terminology Quick Reference Guide.”
Objectives
By the end of this session, participants will be able to:
Understand the regulatory landscape governing third- and fourth-party risk.
Identify similarities and differences across key regulations.
Apply regulatory requirements to vendor due diligence and monitoring.
Develop strategies to prepare for evolving compliance challenges.
Session Breakdown (45 minutes)
1. Introduction: Why Regulation Matters (5 minutes)
The rise of third- and fourth-party dependencies.
Regulatory scrutiny on vendor ecosystems.
Headlines/case examples of regulatory fines due to vendor failures.
2. Today’s Laws & Frameworks (15 minutes)
GDPR: Vendor accountability, privacy obligations, data processors.
DORA (Digital Operational Resilience Act): ICT third-party oversight in EU financial sector.
OCC / FFIEC Guidance: U.S. banking sector TPRM rules.
HIPAA: Business Associate Agreements.
ISO 27001 / ISO 42001: Security & AI governance requirements.
SOC 2: Trust Service Criteria for vendors.
(Visuals: world map with regional regulations.)
3. Commonalities Across Regulations (10 minutes)
Need for due diligence before onboarding vendors.
Ongoing monitoring requirements.
Documentation, audit trails, reporting.
Incident response & notification timelines.
4. Key Differences in Regulations (7 minutes)
Privacy focus (GDPR, HIPAA) vs. operational resilience (DORA).
Sector-specific (banking vs. healthcare vs. tech).
Scope: critical vs. all vendors.
Enforcement: fines, operational shutdowns, license restrictions.
5. Preparing for Regulatory Challenges (5 minutes)
Building a regulatory mapping matrix.
Leveraging TPRM tools & automation for compliance.
Aligning policies with NIST CSF/AI RMF.
Training internal teams & vendors.
6. Wrap-Up & Q&A (3 minutes)
Recap of key laws and terms.
Emerging trends (AI governance, cross-border regulations).
Questions & discussion.
Session Aids
Slide deck with regulation comparisons.
Case study examples (e.g., GDPR vendor fine, DORA in action).
Handout: “TPRM Regulatory Glossary & Matrix.”
Session Objectives
By the end of this session, participants will be able to:
Understand the role of contracts in managing third-party risk.
Identify key contractual clauses that mitigate cyber, compliance, and operational risks.
Learn how to align contract terms with regulatory requirements.
Apply best practices for monitoring and enforcing vendor obligations.
Session Breakdown (45 minutes)
1. Introduction: Why Contract Management Matters (5 minutes)
Contracts as the foundation of vendor governance.
Linking contracts to TPRM lifecycle (onboarding → monitoring → offboarding).
Real-world examples of contract gaps causing risk exposure.
2. Key Clauses in TPRM Contracts (15 minutes)
Data protection & privacy (GDPR, HIPAA, DORA alignment).
Information security requirements (encryption, SOC 2, ISO 27001).
Audit rights (access to assessments, penetration tests).
Incident notification & breach response (timelines, responsibilities).
Business continuity & disaster recovery obligations.
Subcontracting / fourth-party management clauses.
3. Aligning Contracts with Regulations (10 minutes)
GDPR: Data processing agreements (DPAs).
DORA: Critical vendor oversight and resilience requirements.
OCC/FFIEC: Financial services vendor guidelines.
ISO & NIST frameworks for standardization of language.
4. Monitoring & Enforcement (7 minutes)
Establishing contract scorecards.
Leveraging technology (CLM – Contract Lifecycle Management systems).
Renewal/termination triggers.
Common pitfalls (unenforceable clauses, vague language).
5. Preparing for Challenges (5 minutes)
Negotiating with large vendors (cloud providers, SaaS giants).
Balancing risk transfer vs. shared responsibility.
Legal vs. business priorities in contract negotiations.
6. Wrap-Up & Q&A (3 minutes)
Recap: Top 5 must-have TPRM clauses.
Future trends: AI in contract analysis.
Questions & discussion.
Session Aids
Slide deck with sample contract language.
Case study (breach without proper contractual protections).
Handout: “TPRM Contract Clause Checklist.”
Session Objectives
By the end of this session, participants will be able to:
Understand the sourcing lifecycle in TPRM.
Apply structured approaches to evaluating and ranking vendors.
Recognize common risk categories (security, financial, regulatory, reputational).
Use scoring and tiering models to prioritize oversight and resources.
Session Breakdown (45 minutes)
1. Introduction: Why Sourcing & Rankings Matter (5 minutes)
Vendors as critical extensions of the business.
Poor sourcing decisions → higher compliance, operational, and reputational risk.
Example: vendor selection missteps leading to breaches.
2. The TPRM Sourcing Lifecycle (10 minutes)
Needs identification → market scan → RFP/RFI → vendor evaluation → contract.
Importance of aligning sourcing with business and regulatory strategy.
Role of procurement vs. risk/compliance vs. IT/security teams.
3. Risk Categories to Consider (10 minutes)
Information Security Risk (data handling, SOC 2, ISO 27001).
Operational Risk (process reliability, staffing).
Regulatory/Compliance Risk (GDPR, DORA, HIPAA, OCC).
Financial Risk (vendor solvency, cost volatility).
Reputational Risk (brand damage, public trust).
Concentration Risk (dependence on one/few vendors).
Geopolitical/ESG Risk (location, sustainability, ethics).
4. Vendor Risk Ranking Models (12 minutes)
Inherent vs. Residual Risk frameworks.
Scoring methodologies: weighted criteria, heat maps, radar charts.
Tiering vendors:
Tier 1: Critical (cloud providers, data processors).
Tier 2: Important (HR, payroll, facilities).
Tier 3: Low impact (non-core suppliers).
Examples of scoring matrices (likelihood x impact).
5. Challenges & Best Practices (5 minutes)
Balancing cost vs. risk in sourcing.
Managing 4th-party risk visibility.
Avoiding checklist-only approaches — need for continuous monitoring.
Using automation and AI tools for vendor scoring.
6. Wrap-Up & Q&A (3 minutes)
Recap: sourcing lifecycle + key risk categories.
Top 3 takeaways: structured evaluation, transparent scoring, continuous monitoring.
Open floor for questions.
Session Aids
Slide deck with sample scoring matrix and heat map.
Case study: vendor ranking failure → breach exposure.
Handout: “TPRM Vendor Risk Scoring Framework.”
In the context of Third-Party Risk Management (TPRM), inter-affiliate relationships present unique challenges and opportunities. Unlike traditional vendor engagements, affiliates often operate under shared ownership structures, yet maintain separate governance, processes, and risk profiles. This can blur accountability and create assumptions that affiliates pose less risk simply because they are “part of the same group.” In reality, affiliates may be subject to different regulatory environments, data handling practices, or operational controls, introducing vulnerabilities into the enterprise ecosystem. A strong TPRM program must therefore extend due diligence and ongoing monitoring to affiliates, with clear contractual agreements, standardized policies, and aligned risk frameworks. By treating affiliates as critical third parties—while leveraging the trust and transparency of intra-group relationships—organizations can balance efficiency with compliance and resilience
Artificial Intelligence (AI) is revolutionizing Third-Party Risk Management (TPRM) by enhancing the speed, accuracy, and scalability of risk assessments. Traditional methods often rely on manual questionnaires and periodic reviews, which can be slow and inconsistent. AI-driven tools enable continuous monitoring of vendors by analyzing vast amounts of data—such as security incidents, financial health indicators, regulatory updates, and even news or social media signals—in real time. This allows organizations to identify emerging risks across their third- and fourth-party ecosystems before they escalate. However, AI also introduces new challenges, including the need for transparency, bias management, and compliance with emerging AI regulations such as the EU AI Act and NIST AI RMF. A robust discussion on AI in TPRM should therefore explore both the opportunities for automation and predictive analytics, and the governance requirements necessary to ensure AI-driven risk management remains ethical, explainable, and trustworthy.
Duration: 3 hours (flexible)
Workshop Objectives
By the end of the workshop, participants will be able to:
Understand the core components of a TPRM framework.
Apply regulatory and industry requirements to vendor oversight.
Conduct a third-party risk assessment using real-world tools.
Create a vendor risk ranking model (heat map or tiering).
Develop actionable strategies for contract management and ongoing monitoring.
Workshop Agenda
1. Introduction to TPRM (10 minutes)
Why TPRM is critical in today’s interconnected ecosystem.
The TPRM lifecycle: sourcing → onboarding → monitoring → offboarding.
Key terminology and regulatory drivers (GDPR, DORA, OCC, ISO 27001, NIST CSF).
Interactive: Quick poll on participants’ top TPRM challenges.
2. Case Study: Vendor Data Breach (15 minutes)
Walkthrough of a real-world vendor breach scenario.
Discussion: What went wrong? How could it have been prevented?
Identify the risks: information security, compliance, financial, reputational.
Exercise: Small groups list risk categories and controls that should have been in place.
3. Risk Assessment Workshop (30 minutes)
Introduction to risk assessment methodologies.
Inherent vs. residual risk.
Tools: SIG Lite, CSA CAIQ, questionnaires, evidence validation.
Exercise: Participants complete a sample vendor risk assessment using a pre-filled questionnaire.
Score vendor risk (High, Medium, Low).
Rank vendors by criticality.
4. Risk Ranking & Heat Map (20 minutes)
Building a scoring model: likelihood × impact.
Visualizing risks with heat maps and vendor tier pyramids.
Exercise: Teams create a simple risk heat map for assigned vendors.
Present results back to the group.
5. Contract Management & Monitoring (10 minutes)
Key contract clauses: data security, audit rights, breach notification, subcontractors.
Continuous monitoring: automated vs. periodic assessments.
Aligning with AI-driven risk monitoring.
Exercise: Review a sample vendor contract — identify missing TPRM protections.
6. Wrap-Up & Action Planning (20 minutes)
Group discussion: What are the top 3 improvements you’ll take back?
Share practical resources (checklists, templates, toolkits).
Q&A.
Workshop Materials
Slide deck (TPRM framework, lifecycle, scoring models).
Case study handout.
Risk assessment questionnaire (sample SIG Lite/CAIQ).
Vendor contract excerpt.
Heat map template (Excel or printed grid).
“TPRM Quick Reference Guide” handout.
The future of Third-Party Risk Management (TPRM) is being shaped by rapid technological advances, evolving regulatory requirements, and increasingly complex global supply chains. Traditional methods of periodic vendor reviews are giving way to continuous monitoring powered by AI, automation, and predictive analytics, enabling organizations to identify risks in real time across third- and even fourth-party ecosystems. At the same time, regulatory frameworks such as DORA, the EU AI Act, and NIST AI RMF are raising the bar for governance, demanding greater accountability, transparency, and resilience in vendor oversight. Beyond cybersecurity and compliance, future TPRM programs will also integrate ESG, sustainability, and ethical considerations into vendor evaluations. By 2030, successful organizations will treat TPRM not as a compliance checkbox, but as a strategic capability—embedding it into digital transformation initiatives, strengthening resilience, and ensuring trust across increasingly interconnected networks
.png)