Skip to content

TPRM: 40% of disruptions start with third parties — DORA and NIS2 require formal management

Vendor due diligence and continuous third-party risk management: supply chain risk, DORA, NIS2, ongoing monitoring, SLA management, and exit strategies.

40%
Of serious business disruptions originate in third-party supplier failures
DORA
Requires formal ICT provider risk management for all financial entities
NIS2
Requires digital supply chain risk management in critical sectors
4.8/5 on Google · 50+ reviews 25+ years experience 5 offices in Spain 500+ clients
Quick assessment

Does this apply to your business?

Do you have an up-to-date inventory of all suppliers with access to your critical systems or data, classified by criticality level?

Have you conducted a formal assessment of the cybersecurity posture and continuity capacity of your most critical suppliers?

Do your contracts with critical suppliers include audit clauses, incident notification obligations, SLAs with penalties, and exit rights?

Do you have a documented exit strategy for your most critical ICT or data suppliers?

0 of 4 questions answered

Our approach

Our TPRM programme: from inventory to continuous monitoring

01

Third-party inventory and classification

We identify all suppliers and third parties with access to the organisation's critical systems, data, or processes. We classify them by criticality and potential risk level, prioritising the assessment process by the impact their failure or compromise would generate.

02

Initial due diligence on critical suppliers

We conduct due diligence on critical suppliers: assessment of their cybersecurity posture, business continuity capacity, relevant regulatory compliance (GDPR, NIS2, DORA), financial health, and operational references. Includes structured questionnaires, certification review, and on-site audits where warranted.

03

Contractual framework and risk SLAs

We review and strengthen the contractual framework with critical suppliers: business continuity clauses, cybersecurity requirements, audit rights, incident notification obligations, service levels (SLAs) with penalties, and exit and transition clauses.

04

Continuous monitoring and lifecycle management

We implement the continuous monitoring process for critical third parties: risk alert tracking (adverse news, security incidents, regulatory changes), periodic risk assessment review, and supplier lifecycle management including activation of exit strategies when required.

The challenge

A company is only as resilient as its most critical suppliers. The failure of a technology provider, logistics partner, or data processor can disrupt operations, compromise customer data, or generate regulatory breaches just as a severe internal incident would. Yet most companies have no systematic process for evaluating and monitoring third-party risks — they assume their supplier is secure because they have worked together for years.

Our solution

We implement third-party risk management (TPRM) programmes adapted to each organisation's sector and risk profile: from initial due diligence on critical suppliers to ongoing monitoring, SLA management, and exit strategy planning. For financial entities we address DORA's specific requirements; for entities in essential sectors we coordinate with NIS2 supply chain obligations.

Third-Party Risk Management (TPRM) is the systematic process of identifying, assessing, monitoring, and mitigating the risks posed by suppliers, technology providers, and other external parties that have access to an organisation's critical systems, data, or processes. In the EU regulatory context, DORA (Digital Operational Resilience Act, applicable from January 2025) imposes specific TPRM obligations on financial entities regarding their critical ICT providers, including mandatory contractual clauses, enhanced due diligence, and incident notification requirements. NIS2 (transposed into Spanish law) similarly requires essential and important sector entities to assess and manage the cybersecurity risks of their digital supply chains.

Our third-party risk management team combines corporate due diligence expertise with knowledge of cybersecurity, digital regulation, and contract management for critical technology providers.

Why third-party dependency is the fastest-growing source of operational risk

Dependence on third parties is a structural feature of modern business. Companies outsource critical functions — data processing, technology infrastructure, logistics, payroll management — that twenty years ago were internally controlled capabilities. This outsourcing generates efficiency, but it also transfers risk: when the supplier fails, that supplier’s customers bear the consequences. The collapse of a cloud service provider, a ransomware attack on a payments processor, or the insolvency of a logistics partner can halt operations as severely as an internal disaster — with the added difficulty that the company has far less direct control over the incident.

The 40% of serious business disruptions that originate in third-party failures is not a figure that companies can afford to ignore, particularly under DORA for financial entities and NIS2 for essential and important entities. Both regulations require formal documentation and management of supply chain risks, with the possibility of sanction if the requirements are not met. The typical scenario: a company depends on a cloud provider for its ERP, the provider suffers a 24-hour outage, and on reviewing the contract the company discovers the SLA only guarantees 99.5% monthly availability (equivalent to 3.6 acceptable hours of downtime per month without compensation), there are no continuity clauses, and the provider has no obligation to notify incidents.

Our TPRM programme: from inventory to continuous monitoring

The first step is always visibility. Most organisations do not have a complete, up-to-date inventory of their critical suppliers: they know their main vendors, but lack a systematic classification of which ones, if they failed, would have a severe impact on operations or regulatory compliance. Building that inventory — with classification by criticality, system and data access, and regulatory risk level — is the foundation of any effective TPRM programme.

Our professionals implement the TPRM programme in three phases. The first is visibility: we build the complete inventory of third parties with access to critical systems, data, or processes, and classify them by criticality level (critical, important, ordinary). The second is assessment: for critical suppliers we conduct structured due diligence with a security questionnaire, certification review (ISO 27001, SOC2, ENS), and continuity capacity assessment. The third is protection: we review and strengthen contracts with critical suppliers (audit clauses, incident notification within 24 hours, SLAs with penalties, exit and transition clauses) and implement the continuous monitoring system with real-time risk alerts.

Supplier due diligence goes well beyond reviewing certifications. Assessing the real cybersecurity posture of a supplier — not just whether they hold ISO 27001, but how they actually manage incidents, how they segment access to their clients’ systems, what happens to the company’s data if the supplier is acquired — requires detailed questionnaires, technical review, and in the most critical cases, on-site audits. For financial entities subject to DORA, this process is governed by specific minimum contractual requirements that we manage end to end. We integrate third-party monitoring with the risk register of the corporate ERM framework to ensure that supplier risks have visibility at the leadership and board level. For companies that have also implemented a business continuity plan, TPRM is the essential complement that covers risks originating outside the organisation, and we coordinate with data protection obligations for suppliers that process personal data on the organisation’s behalf.

What our TPRM service includes

The service covers the inventory and classification of all third parties with access to critical systems or data, structured due diligence on critical suppliers (security questionnaire, certification review, continuity assessment, risk report with recommendations), review and strengthening of contractual framework with security, audit, SLA, and exit clauses, continuous monitoring system with risk alerts, annual review of critical supplier assessments, integration with corporate ERM risk register, and for financial entities, compliance with DORA’s specific ICT provider management requirements.

Real results in third-party risk management

Companies that implement the TPRM programme with our team identify on average between three and eight critical suppliers whose contracts lack minimum protection clauses in the event of a failure or security incident. Renegotiation of these contracts generates concrete protections: SLAs with real penalties, incident notification clauses within 24 hours, and audit rights. Detection time for a problem in a critical supplier is reduced from days or weeks to hours through the continuous monitoring system. And for entities subject to DORA or NIS2, implementing the TPRM programme eliminates the risk of regulatory sanction for non-compliance with supply chain risk management requirements.

Frequently asked questions about DORA, NIS2, and supplier risk

The contractual framework with critical suppliers is the most underestimated protection instrument. Contracts with large technology providers (cloud, SaaS, data processors) are often adhesion contracts that the provider presents without negotiation. However, in many cases it is possible to negotiate additional security, audit, and continuity clauses — particularly when contract volume justifies it. And in every case, the contract must include exit clauses that allow the company to migrate to an alternative provider without the current provider blocking the transition by retaining data or technical documentation. Continuous monitoring transforms TPRM from a point-in-time exercise into a permanent operational capability: a supplier with an adequate security posture today may suffer an incident tomorrow, and early detection is what enables proactive decisions before the problem affects operations.

Track record

Real results in third-party risk management

Our main cloud service provider suffered an 18-hour outage that left us without critical operations. When we reviewed the contract we discovered the SLA entitled us to a negligible credit and there was no continuity clause at all. BMC renegotiated all our critical supplier contracts and implemented a monitoring programme that now gives us real-time visibility on every supplier's status.

Iberian Financial Services S.A.
Chief Operating Officer

Experienced team with local insight and international reach

What you get

What our TPRM service includes

Third-party inventory and classification

Identification and classification of all third parties with access to critical systems, data, or processes, prioritised by criticality and potential risk level.

Critical supplier due diligence

Structured assessment of critical suppliers: cybersecurity, business continuity, regulatory compliance, financial stability, and operational references. Includes questionnaires, certification review, and on-site audits.

Contractual framework and SLAs

Review and strengthening of contractual frameworks with critical suppliers: security, continuity, audit, incident notification clauses, SLAs with penalties, and exit and transition conditions.

Continuous third-party monitoring

Continuous monitoring system: risk alert tracking, periodic assessment reviews, third-party incident management, and supplier risk register updates.

Exit strategies and transition planning

Design of exit strategies for critical suppliers: migration plan documentation, pre-qualification of alternatives, and transition management when exit is activated.

FAQ

Frequently asked questions about DORA, NIS2, and supplier risk

Third-party risk management is the systematic process of identifying, assessing, monitoring, and mitigating the risks posed by suppliers, partners, and other third parties that have access to the organisation's systems, data, or processes. TPRM goes beyond initial due diligence: it includes continuous monitoring throughout the relationship and active management of incidents when a third party fails or is compromised.
DORA (Digital Operational Resilience Act) imposes very specific obligations on financial entities regarding their critical ICT providers. Entities must: maintain an updated register of all contractual arrangements with ICT providers, identify critical or important ICT providers, conduct enhanced due diligence on these providers, include mandatory contractual clauses in contracts with critical ICT providers (audit rights, incident notification, exit plans), and participate in the direct oversight frameworks for critical ICT providers established by the regulation.
NIS2 requires essential and important entities to manage the cybersecurity risks of their supply chain. This involves assessing the cybersecurity posture of direct suppliers (especially those with access to critical systems or data), including cybersecurity requirements in supplier contracts, and having mitigation plans if a supplier is compromised. NIS2 supervisory authorities can require documentary evidence of these assessments.
Concentration risk exists when a company depends on a single supplier for a critical service with no viable alternatives. If that supplier fails, is acquired, suffers a serious security incident, or simply changes its service terms, the company is exposed with no immediate mitigation capacity. DORA makes explicit reference to ICT provider concentration risk. Mitigation strategies include provider diversification, maintenance of minimum internal capabilities, and negotiation of protective contractual clauses.
An effective exit clause must cover: the right to terminate the contract without penalty in cases of SLA breach or serious security incident, the transition period during which the supplier must continue providing the service, the supplier's obligations to facilitate data migration and technical documentation, certified data destruction at contract end, and audit rights during the transition period.
Review frequency must be proportionate to supplier criticality: critical or important suppliers should be formally reviewed at least annually, with continuous risk alert monitoring between reviews. Any significant incident (service failure, security breach, change of ownership, regulatory sanction) should trigger an ad hoc review of the affected supplier.
Yes. Pre-contracting supplier due diligence is one of the most in-demand services, particularly for ICT providers, data processors, and critical cloud services. We assess the supplier's security posture, continuity capacity, regulatory compliance, and financial stability, and issue a report with recommendations on whether to proceed and what minimum contractual conditions must be required.
An exit strategy is the plan defining how the organisation can terminate a relationship with a critical supplier and migrate to an alternative, minimising operational impact. It must be documented before there is any need to activate it. Typical triggers include: repeated SLA non-compliance, serious security incident attributable to the supplier, supplier insolvency, unacceptable change in service conditions, or identification of a significantly better alternative.
First step

Start with a free diagnostic

Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.

Third-Party Risk Management

Operations

First step

Start with a free diagnostic

Our team of specialists, with deep knowledge of the Spanish and European market, will guide you from day one.

25+
years experience
5
offices in Spain
500+
clients served

Request your diagnostic

We respond within 4 business hours

Or call us directly: +34 910 917 811

Call Contact