Skip to the main content.

3rd Party Security Risk Assessments

Assess the security posture of your critical vendors and suppliers.

If you’re like almost every company in the world, you rely on 3rd party suppliers and vendors for your company’s success.

What would happen if one of those 3rd parties suffered a breach or major outage?

Have you done your diligence and selected the right vendors?

Do you have evidence that you’ve trusted your company’s and customer’s data to reliable, trustworthy companies?

At ICE we understand the complexities of the modern supply chain and shared responsibility model.

We take a risk-based approach to 3rd party assessments and help you select the right vendors and suppliers to assess, assess with appropriate rigor and balance all that against your budget.

Medal-Number-One--Streamline-Cyber


When you’re ready to improve the risk and resiliency of your supply chain and raise your confidence level, ICE 3rd party risk assessments are right for you.

How It Works

  1. We help select the most critical suppliers and vendors based on their role in your company and the sensitivity of the data they hold for you.

  2. We tune one of our assessments to your unique needs ensuring the right level of rigor and effort are applied.

  3. We execute our assessments on a schedule that is feasible and manageable for you, us and your vendors

  4. We contextualize any gaps or deficiencies against your business and determine the best course of action.

  5. We refresh those assessments annually to be sure your vendors and suppliers continually meet their commitment to security

Lock-Key--Streamline-Cyber

What We Find

Unfortunately, not every vendor and supplier has the highest levels of security. 

No matter the situation, we help know what your risk is and what you should do about it. Some typical outcomes for 3rd party risk assessments include:

Good: Vendors / suppliers with good security controls – or acceptable risk and the ability to prove it!

Bad: When a vendor or supplier has a security gap that needs to be addressed – this usually comes with a requirement to demonstrate that they’ve resolved the issue.

Ugly: When a vendor doesn’t have the basic controls in place or the ability to demonstrate and hey are likely putting your company at risk.

Pedestal-2--Streamline-Cyber

Pricing Factors

Assessments are priced based on:

Number of 3rd party vendors/suppliers to assess

Criticality of those 3rd parties

Frequency of assessment

Signal-Person-1--Streamline-Cyber
Hexagon Background Element - Version 3-2