Why Third-Party Risk Is the Biggest Gap in Your Clients' Security Posture
嗯,用户让我用中文总结一下这篇文章,控制在一百个字以内,而且不需要特定的开头。首先,我需要通读整篇文章,抓住主要观点。 文章主要讲的是第三方风险如何成为企业面临的主要威胁。过去,企业注重内部安全,但现在数据和操作依赖于第三方服务和供应商,导致攻击面扩大。第三方风险涉及SaaS工具、 subcontractors等,这些通常是内部IT团队不了解的。 文中提到 Verizon 和 IBM 的报告,显示30%的数据泄露涉及第三方,平均修复成本高达491万美元。这说明第三方风险不再是边缘问题,而是核心业务的一部分。 接着,文章讨论了传统风险管理方法的不足,比如年度问卷和手动分析效率低下。新的合规框架如CMMC、NIS2等提高了要求,企业需要持续监控第三方控制措施。 然后,文章指出服务提供商的机会。通过建立结构化的TPRM(第三方风险管理)能力,他们可以提供高附加值的服务,如安全咨询、更高的保留率和更强的客户关系。这不仅帮助客户提升安全性,还能在竞争激烈的市场中脱颖而出。 最后,文章强调了投资TPRM的重要性,并推荐了Cynomi的指南作为参考。 总结下来,文章的核心是:第三方风险日益重要,传统方法已不适用,服务提供商应通过技术驱动的TPRM解决方案抓住机会。 </think> 文章指出第三方风险已成为企业主要威胁来源。随着数据依赖外部供应商和SaaS工具扩展攻击面,传统边界防护已失效。报告数据显示30%数据泄露涉及第三方,修复成本高昂达491万美元。传统合规手段如年度问卷已显不足,企业需建立持续性治理机制应对日益复杂的供应链风险,为 MSPs 和 MSSPs 提供新机遇。 2026-4-3 11:0:0 Author: thehackernews.com(查看原文) 阅读量:6 收藏

The next major breach hitting your clients probably won't come from inside their walls. It'll come through a vendor they trust, a SaaS tool their finance team signed up for, or a subcontractor nobody in IT knows about. That's the new attack surface, and most organizations are underprepared for it.

Cynomi's new guide, Securing the Modern Perimeter: The Rise of Third-Party Risk Management, makes the case that TPRM is no longer a compliance formality. It's a frontline security challenge and a defining growth opportunity for MSPs and MSSPs who get ahead of it.

The Modern Perimeter Has Expanded

For decades, cybersecurity strategy revolved around a defined perimeter. Firewalls, endpoint controls, and identity management systems were deployed to protect assets within a known boundary.

That boundary has dissolved.

Today, client data lives in third-party SaaS applications, flows through vendor APIs, and is processed by subcontractors that internal IT teams may not even know about. Security no longer stops at owned infrastructure. It extends across an interconnected ecosystem of external providers, and the accountability that comes with it extends there, too.

The 2025 Verizon Data Breach Investigations Report found that third parties are involved in 30% of breaches. IBM's 2025 Cost of a Data Breach Report puts the average remediation cost of a third-party breach at $4.91 million. Third-party exposure has become a core feature of modern business operations, not an edge case.

For proactive service providers, this shift creates a substantial opportunity. Organizations facing mounting third-party threats are looking for strategic partners who can own, streamline, and continuously manage the entire third-party risk lifecycle. Service providers who step into that role can introduce new service offerings, deliver higher-value consulting, and establish themselves as central to their clients' security and compliance programs.

From Checkbox to Core Risk Function

The traditional approach to vendor risk relied on annual questionnaires, spreadsheets, and the occasional follow-up email. It was never adequate, and it's especially costly now.

Regulatory frameworks like CMMC, NIS2, and DORA have raised the bar significantly. Compliance now requires demonstrable, ongoing oversight of third-party controls, not a point-in-time snapshot from twelve months ago. Boards are asking harder questions about vendor exposure. Cyber insurers are scrutinizing supply chain hygiene before writing policies. And clients who've watched competitors absorb the fallout from a vendor's breach understand that "it wasn't our system" doesn't limit their liability.

The market is responding accordingly. Global TPRM spending is projected to grow from $8.3 billion in 2024 to $18.7 billion by 2030. Organizations are treating vendor oversight as a governance function, on par with incident response or identity management, because the cost of ignoring it has become too high.

For service providers, that budget allocation is a clear signal. Clients are actively looking for partners who can own and manage vendor oversight as a defined, ongoing service.

Scaling TPRM Is Where Most Providers Get Stuck

Most MSPs and MSSPs recognize the opportunity. The hesitation comes down to delivery, and specifically to whether TPRM can be executed profitably at scale.

Traditional vendor review relies on fragmented workflows and manual analysis. Custom assessments must be sent, tracked, and interpreted, and risk must be tiered against each client's specific obligations. This work often falls to senior consultants, making it expensive and hard to delegate.

Multiplying this effort across a client portfolio with different vendor ecosystems, compliance needs, and risk tolerances can be unsustainable. This is why many providers offer TPRM as a one-off project instead of a recurring managed service.

But that's also where the opportunity lies. Cynomi's Securing the Modern Perimeter guide outlines how structured, technology-enabled TPRM can shift from a bespoke consulting engagement into a repeatable, high-margin service line that strengthens client retention, drives upsell, and positions service providers as integral partners in their clients' security programs.

Turning TPRM Into a Revenue Engine

Third-party risk is a conversation starter that never runs out of material.

Every new vendor a client onboards creates a potential risk discussion. Regulatory updates are natural reasons to revisit vendor programs, and every breach in the news that traces back to a third party reinforces the stakes. TPRM, done well, keeps service providers embedded in client strategy rather than relegated to reactive support, and that positioning changes the nature of the relationship entirely. 

Providers who build out structured TPRM capabilities find that it opens doors to: 

  • Broader security advisory work
  • Higher retainer values
  • Stronger client relationships built on genuine business impact
  • Differentiation in a crowded managed services market
  • Credible third-party risk governance, signaling maturity to prospective clients

The Bottom Line

Third-party risk isn't going away. The vendor ecosystems your clients depend on will keep growing more complex, with more SaaS platforms, AI-powered tools, subcontractors, and regulatory scrutiny layered on top.Organizations that manage this exposure well will have a meaningful advantage in resilience and compliance.

Building a structured, scalable TPRM practice that delivers consistent oversight across your portfolio creates far more leverage than adding headcount or assembling bespoke programs from scratch for every client. The infrastructure you build once pays dividends across every account.

Cynomi's Securing the Modern Perimeter: The Rise of Third-Party Risk Management is a practical starting point. It covers the full scope of modern third-party risk, what a governance-grade TPRM program looks like, and how service providers can build and scale this capability without sacrificing margins. 

Discover how Cynomi helps MSPs and MSSPs operationalize TPRM at scale, or request a demo to explore how it fits your service model.

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/why-third-party-risk-is-biggest-gap-in.html
如有侵权请联系:admin#unsafe.sh