Free third-party risk management in Coalition Control: monitor your supply chain

Attack surface monitoring is just one part of a holistic approach to cybersecurity. Keeping your attack surface as small as possible is a solid goal for any security or cyber risk management leader. However, as organizationsâ digital footprints are constantly evolving, growing and shrinking over time, it can be challenging to maintain visibility â let alone control â over your organization's attack surface in a comprehensive and ongoing manner.
Coalition Control offers free attack surface monitoring for any organization, but it doesnât stop there. Understanding the needs of the modern business, weâve included third-party risk management to help organizations manage their cyber sprawl. âWhatâs third-party risk management,â you ask? Sign up for a free Coalition Control account here, and then weâll continue digging into this hot topic. Done? Cool, letâs go!
What is third-party risk management?
Cloud vendors, IT service providers, external software management firms are examples of third parties â nearly all organizations assume some level of third-party risk as part of operating in a digital world. As a result, third-party risk management (TPRM) is a critical consideration in business right now, as high-impact supply chain attacks have highlighted the need for visibility and control over systemic digital connections. Essentially, TPRM is a concept that enables organizations to see the potential risk impact third parties, such as vendors, suppliers, and partners, pose to their operations.
To get a deeper understanding of TPRM, letâs think about two examples.
The first example is simple. Imagine you use a software-as-a-service (SaaS) solution for your accounting system. There are many of these solutions available, and many of those are household names. If that vendor were breached and your login credentials were compromised, youâd want to know right away. Third-party monitoring helps to track these risks in real-time, and in this scenario, youâd want to consider adding your accounting SaaS vendor to your Coalition Control Watchlist.
The second example is a bit more complicated. Letâs say you have a customer that has access to your inventory through a real-time feed that powers their eCommerce content management system. If this inventory feed lives on a database and that database is not configured properly, a threat actor could potentially gain access to your own organizationâs sensitive data due to a compromise of your customerâs infrastructure.
These two examples illustrate how easily the risk of operating in a digital economy can translate into an adverse cybersecurity event. Keeping an eye on your third party risk can help you get ahead of threats by finding and fixing problems before the bad guys can exploit them.
Free third-party risk management
Coalition Control offers free third-party risk management via what we call a âWatchlist.â Adding your vendors, suppliers, and partners will alert your organization when new critical vulnerabilities are discovered on the internet-facing assets of those third parties. This is a huge value-add for all Coalition policyholders (and free users, too) that enables a holistic view of much of their risk footprint.
To watchlist a company or vendor, click âGo to Watchlistâ on your organizationâs summary page, then click âAdd Company.â

Fill out the fields as prompted for the organization you wish to monitor. For example, you can simply enter a company name (to label the organization in your Watchlist) and a domain. Do not include the âwwwâ at the beginning of the domain name.

If you do not have a complete list of your third-party vendorâs domains, you can use our domain discovery service by clicking âDiscover Domainsâ to add the domains we can find. Then, click âSubmitâ to add the third-partyâs domain to your Watchlist and receive alerts whenever critical vulnerabilities are discovered on their public infrastructure. As with your organization's Control dashboard, you can also identify less critical vulnerabilities and determine whether those items are a risk to your operations.
The Coalition difference
We know there are many different ways to manage, mitigate, and transfer risk. You might already be bombarded with vendors and solutions providers seeking your commitment to their products, and thatâs not necessarily a bad thing.
In reality, Coalition wants you to mitigate your risk in any way possible, and we want to help you lower your risk no matter what. Thatâs why we make Coalition Control available for free to any organization, regardless of what technology they use or how they ultimately manage their risk posture.
Naturally, should an organization choose to transfer their risk through comprehensive cyber insurance, we offer the industryâs leading coverage â at a time when many other carriers are reducing theirs. Sign up for free, and take control of your risk today