drj logo
  • This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Young Professional Spotlight
    • Career Spotlight
    • Article Submission
    • Digital Edition
    • DRJ Annual Resource Directories
    • Article Archives
  • EVENTS
    • DRJ Fall 2022
    • Other Industry Events
    • Schedule & Archive
  • WEBINARS
    • Upcoming
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • Beginner’s Guide to BC
  • RESOURCES
    • White Papers
    • DR Rules and Regs
    • Industry Groups
    • Business Directory
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • FAQs Committee
      • Web Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Blind In The Marketplace: How Vendors and Suppliers Expose Enterprises to Risk

by Jon Seals | August 20, 2021 | | 0 comments

By David Thomas, CEO & Founder, Evident

A new quantitative study has exposed what some risk managers and compliance executives have suspected: Vendors are not complying with corporate insurance requirements, representing a significant risk for their clients and partners. The report – based on thousands of anonymized verification attempts – reveals the extent of the problem, and it’s more serious than most executives might believe.

The report provides detail to help companies better identify their own risk levels. The study also reveals that this is a problem not just for risk and compliance managers, but also for C-level financial and operations executives.

Trust, And Fail To Verify?

The study – published as an easy-to-follow infographic titled “The State of Third-Party Insurance Verification” – shows 75% of third parties were not compliant with the insurance requirements of the companies that hire them, despite detailed policies and procedures to verify that the appropriate insurance coverage exists.

The study highlights the exact points and extent to which the verification process breaks down in three-quarters of the cases, including:

  • 27% start but do not complete the verification process
  • 23% fail to respond to Certificate of Insurance (COI) verification requests entirely
  • 12% receive exceptions to the requirements
  • 9% fall out of compliance after initial success
  • 4% simply choose to not comply

There is a foundational disconnect between the corporate departments that specify the insurance requirements for vendors and partners, and those responsible for assuring compliance and verification. By reducing the verification process to an administrative task, its significance is downplayed to a point where it can be overlooked or ignored.

The result can be considerable unexpected financial exposure to the company the insurance requirements are designed to protect. For larger companies, these are the “deep pockets” that are frequently the targets of legal action, whether deserved or not.

In addition, failure by third-parties to obtain adequate coverage simply moves the cost to the enterprise in terms of increased coverage and higher premiums.

When enterprises can clearly demonstrate that a third-party network meets its insurance requirements, they can negotiate more competitive liability premiums and create a more efficient insurance coverage tower.

Is Ops Opting Out?

Whether incomplete verification is a deliberate or inadvertent decision, the issue remains critical as global supply chains increase exposure to risks. The challenge is compounded by the rapid restoration of supply chains as the world emerges from the pandemic lockdown. The desire to get businesses back to full capacity can often override prudent measures to mitigate corporate liabilities.

Cyber liability is another exploding area of financial exposure for companies and their vendors and partners. The interoperations of networked systems have blurred or even erased the bright lines of culpability in the event of data breaches and the deployment of malware. This issue has exploded in recent headlines following a rise in high-profile ransomware attacks. Such vulnerabilities have existed for decades, but unprecedented ransom demands, rising losses, and increasing cyber insurance premiums are making it difficult for companies to quietly manage the fallout of data breaches in an effort to protect their brand and business.

All these exposures can come from an urgency to onboard vendors of critical supplies or services, or a desire to avoid friction with otherwise trusted partners. In many cases, this critical policy decision is made at the clerical level despite its potentially strategic implications. When interdepartmental workflows are disconnected from business outcomes, the teams managing the financial consequences of risk will struggle to keep pace as new exposures are created.

A Reckoning vs. A Recourse

The financial scale of these exposures elevates them to C-suite challenges that demand attention at the highest level. The challenge remains how enterprises can gain visibility into – much less gain control over – this critical operational detail.

Understanding how and where the verification process breaks down and reinforcing the process “gates” can improve compliance and better protect companies. Simplifying the process by employing a cloud-based verification service can give executives visibility into non-compliance and enable judgment calls to be made at the strategic level, where they belong.  

As a result, emerging tools that can both simplify and strengthen verification processes are being increasingly adopted at large enterprises. This enables specific prescriptive remediation of gaps or oversights. Alternatively, such a detailed report can inform a strategic decision by upper management on how to handle the resource or the relationship. Leveraging these tools allows companies to better protect themselves from third-party insurance claims and can more than pay for themselves in reduced premiums gained from their rigorous use.

Businesses that can demonstrate improvements in vendor compliance through automated verification reports are positioned to negotiate more competitive insurance rates at renewal. With just minor improvements, some have reported 2-5% reductions in liability premium spend.

It is ultimately the responsibility of the C-suite to ensure third-party COI verifications are properly conducted and completed. With the right tools in place, consistent verifications can be relatively frictionless and inexpensive, lead to more favorable insurance renewals, and shield a company from potential claims.

The full report can be seen here.

About the Author: The CEO and Founder of Evident, David Thomas, is a cybersecurity entrepreneur and industry expert. Having held key leadership roles at market-pioneers Motorola, AirDefense, VeriSign, and SecureIT, he has a history of introducing innovative technologies and getting them to market. Recruited at a young age by the Department of Defense, David has been at the forefront of cybersecurity. David sees cybersecurity as the key ingredient to enable reliable, fast interconnectivity between people.


Recent Posts

  • Download Your Planning Templates
  • They Called Me ‘The Queen of Doom’
  • Business Continuity as a Business Strategy
  • AlertMedia Improves Emergency Management with the Launch of Event Pages: Connecting People with Critical Information in Real-Time
  • Disaster Recovery Planning in a VM Operating Environment

Recent Comments

  • carybaron@yahoo.com on Contingency Planning Cycle
  • marifergerson0102 on Contingency Planning Cycle

Archives

  • December 2020 (1)
  • October 2020 (1)
  • August 2020 (1)
  • January 2020 (1)
  • November 2019 (9)
  • October 2019 (8)
  • September 2019 (8)
  • August 2019 (17)
  • July 2019 (77)
  • June 2019 (92)
  • May 2019 (128)
  • April 2019 (109)
  • March 2019 (80)
  • February 2019 (106)
  • January 2019 (102)
  • December 2018 (96)
  • November 2018 (131)
  • October 2018 (139)
  • September 2018 (81)
  • August 2018 (124)
  • July 2018 (113)
  • June 2018 (90)
  • May 2018 (142)
  • April 2018 (151)
  • March 2018 (124)
  • February 2018 (157)
  • January 2018 (140)
  • December 2017 (118)
  • November 2017 (158)
  • October 2017 (186)
  • September 2017 (139)
  • August 2017 (212)
  • July 2017 (179)
  • June 2017 (214)
  • May 2017 (230)
  • April 2017 (223)
  • March 2017 (159)
  • February 2017 (175)
  • January 2017 (112)
  • December 2016 (8)
  • October 2016 (12)
  • June 2016 (15)
  • May 2016 (4)
  • April 2016 (10)
  • January 2016 (10)
  • December 2015 (2)
  • October 2015 (12)
  • September 2015 (2)
  • June 2015 (15)
  • April 2015 (15)
  • March 2015 (6)
  • February 2015 (7)
  • January 2015 (6)
  • December 2014 (18)
  • November 2014 (19)
  • October 2014 (24)
  • September 2014 (11)
  • August 2014 (13)
  • July 2014 (7)
  • June 2014 (36)
  • May 2014 (19)
  • April 2014 (21)
  • March 2014 (90)
  • February 2014 (5)
  • January 2014 (26)
  • December 2013 (10)
  • November 2013 (25)
  • October 2013 (37)
  • September 2013 (27)
  • August 2013 (8)
  • July 2013 (8)
  • June 2013 (31)
  • May 2013 (17)
  • April 2013 (103)
  • March 2013 (82)
  • February 2013 (120)
  • January 2013 (212)
  • December 2012 (128)
  • November 2012 (92)
  • October 2012 (159)
  • September 2012 (112)
  • August 2012 (153)
  • July 2012 (106)
  • June 2012 (91)
  • May 2012 (35)
  • April 2012 (49)
  • March 2012 (14)
  • February 2012 (19)
  • January 2012 (44)
  • December 2011 (9)
  • November 2011 (21)
  • October 2011 (45)
  • September 2011 (13)
  • August 2011 (9)
  • July 2011 (47)
  • May 2011 (46)
  • April 2011 (10)
  • March 2011 (25)
  • February 2011 (1)
  • January 2011 (17)
  • December 2010 (8)
  • October 2010 (19)
  • September 2010 (1)
  • July 2010 (23)
  • June 2010 (1)
  • May 2010 (1)
  • April 2010 (21)
  • March 2010 (1)
  • February 2010 (1)
  • January 2010 (4)
  • December 2009 (20)
  • November 2009 (4)
  • October 2009 (17)
  • September 2009 (11)
  • August 2009 (2)
  • July 2009 (2)
  • June 2009 (79)
  • April 2009 (20)
  • March 2009 (1)
  • January 2009 (22)
  • November 2008 (1)
  • October 2008 (1)
  • July 2008 (4)
  • June 2008 (22)
  • April 2008 (25)
  • February 2008 (1)
  • January 2008 (16)
  • December 2007 (17)
  • November 2007 (662)
  • October 2007 (410)
  • September 2007 (1)
  • November 1999 (1)

ARTICLES & NEWS

  • Business Continuity
  • Disaster Recovery
  • Crisis Management & Communications
  • Risk Management
  • Article Archives
  • Industry News

THE JOURNAL

  • Digital Edition
  • Young Professionals
  • Career Spotlight
  • Advertising & Media Kit
  • Submit an Article

RESOURCES

  • White Papers
  • Rules & Regulations
  • FAQs
  • Glossary of Terms
  • Industry Groups
  • Business & Resource Directory
  • Business Resilience Decoded

EVENTS

  • Fall 2022
  • Spring 2022

WEBINARS

  • Watch Now
  • Upcoming

CONTACT

  • Article Submission
  • Media Kit
  • Contact Us

ABOUT DRJ

Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

LEARN MORE

TWITTER

Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

Follow us for daily updates @drjournal

Newsletter

The Journal, right in your inbox.

Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

Subscribe Now
Copyright 2022 Disater Recovery Journal
  • Terms of Use
  • Privacy Policy