{"id":15020,"date":"2023-03-09T11:06:52","date_gmt":"2023-03-09T10:06:52","guid":{"rendered":"https:\/\/www.amendos.de\/uncategorized\/risk-management-in-it-vendor-management\/"},"modified":"2024-08-08T18:09:18","modified_gmt":"2024-08-08T16:09:18","slug":"risk-management-in-it-vendor-management","status":"publish","type":"post","link":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/","title":{"rendered":"Risk Management in IT Vendor Management"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column][vc_column_text]<strong>Risk management in IT vendor management is essential to minimize risks during and after the outsourcing of IT services, ensuring smooth service operations. In today&rsquo;s digital world, businesses are increasingly dependent on IT services, making the efficiency and quality of these services critical to their success. In the following, we show how to effectively handle risk management for IT services during outsourcing, particularly in the operational phase as part of vendor management.<\/strong>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text]<\/p>\n<h2>Introduction to Handling Risks in IT Outsourcing<\/h2>\n<p>Managing outsourcing risks is crucial for companies to maintain the stability, security, and integrity of their IT systems and data. Additionally, it helps ensuring compliance with legal and regulatory requirements. The goal of risk management in IT vendor management is to identify, assess, and mitigate risks that arise from cooperating with service providers.<\/p>\n<p>Risk management should be active in all phases of the outsourcing lifecycle:<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15029 size-full\" src=\"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1.png\" alt=\"Risk Management in IT Vendor Management - based on the Outsourcing Lifecycle\" width=\"1920\" height=\"768\" srcset=\"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1.png 1920w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1-300x120.png 300w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1-1024x410.png 1024w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1-768x307.png 768w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure1-1-1536x614.png 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"><\/p>\n<p style=\"text-align: center;\">Figure 1: Outsourcing Lifecycle and Risk Management<\/p>\n<p>&nbsp;<\/p>\n<p>During the &ldquo;Strategy&rdquo; phase, potential risks associated with the decision to outsource IT services are thoroughly examined. In the &ldquo;Concept&rdquo; phase, where the design of the services to be outsourced is developed, only alternatives with acceptable risks are considered.<\/p>\n<p>Subsequently the &ldquo;Request-for-Proposal&rdquo; (RFP) phase involves evaluating provider characteristics to identify and analyze potential risks. Service provider selection is based on a balanced assessment of acceptable risks versus the anticipated benefits. Essential risk mitigation measures should be clearly defined and included in the contract with the service provider.<\/p>\n<p>Finally in the &ldquo;Transition&rdquo; phase, risk management is integrated into project management processes. Upon completing the transition project, project managers transfer risk management responsibilities to the operational team to ensure continued oversight during the operational phase.<\/p>\n<p>&nbsp;<\/p>\n<h2>Legal and Regulatory Requirements<\/h2>\n<p>Regulated industries such as finance, insurance, and critical infrastructure (KRITIS) must adhere to strict guidelines and legal requirements for risk management in IT outsourcing. These requirements often need to be translated into specific procedures and processes within the company. Examples include:<\/p>\n<h4><strong>Financial Sector<\/strong><\/h4>\n<ul>\n<li>EBA <a href=\"https:\/\/www.eba.europa.eu\/sites\/default\/files\/documents\/10180\/2551996\/38c80601-f5d7-4855-8ba3-702423665479\/EBA%20revised%20Guidelines%20on%20outsourcing%20arrangements.pdf\">Guidelines on Outsourcing Arrangements<\/a> (<a href=\"https:\/\/www.eba.europa.eu\/sites\/default\/files\/documents\/10180\/2551996\/38c80601-f5d7-4855-8ba3-702423665479\/EBA%20revised%20Guidelines%20on%20outsourcing%20arrangements.pdf\">EBA\/GL\/2019\/02<\/a>)<\/li>\n<li>DORA (<a href=\"https:\/\/www.eiopa.europa.eu\/digital-operational-resilience-act-dora_en\">Digital Operational Resilience Act<\/a>; EU 2022\/2554)<\/li>\n<li>German Banking Act (Kreditwesengesetz &ndash; KWG), &sect;25b<\/li>\n<li>Minimum Requirements for Risk Management (MaRisk) &ndash; AT 9 (a German regulation)<\/li>\n<li>Supervisory Requirements for IT in Financial Institutions (Bankaufsichtliche Anforderungen an die IT &ndash; BAIT; a German regulation)<\/li>\n<\/ul>\n<h4><strong>Insurance Sector<\/strong><\/h4>\n<ul>\n<li>EIOPA Guidelines on ICT Security and Governance (<a href=\"https:\/\/www.eiopa.europa.eu\/publications\/guidelines-information-and-communication-technology-security-and-governance_en\">EIOPA-BoS-20\/600<\/a>)<\/li>\n<li>German Insurance Supervision Act (Versicherungsaufsichtsgesetz &ndash; VAG), &sect;32<\/li>\n<li>Minimum Requirements for the Business Organization of Insurance Companies (MaGo) &ndash; &sect;13 (a German regulation)<\/li>\n<li>Supervisory Requirements for IT in Insurance Companies (Versicherungsaufsichtliche Anforderungen an die IT &ndash; VAIT; a German regulation)<\/li>\n<\/ul>\n<h4><strong>Critical Infrastructure Sector (KRITIS)<\/strong><\/h4>\n<ul>\n<li>ISO\/IEC 27001<\/li>\n<li><a href=\"https:\/\/www.bsi.bund.de\/EN\/Themen\/Unternehmen-und-Organisationen\/Standards-und-Zertifizierung\/IT-Grundschutz\/it-grundschutz_node.html\">BSI Standard 200-3: Risk Management<\/a><\/li>\n<li>BMI &ndash; Protection of Critical Infrastructures &ndash; Risk and Crisis Management &middot; Guide for Companies and Authorities<\/li>\n<li>IT Security Act 2.0<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Risk Analysis for Outsourced IT Services<\/h2>\n<p>Risk management for outsourced IT services can be divided into two phases: before outsourcing and after outsourcing. Before outsourcing, the client is solely responsible for risk management.<\/p>\n<p>After outsourcing, risks can be categorized into three groups: client risks, provider risks, and interface risks. <strong>Client risks<\/strong> are IT-related risks that remain with the client. Outsourcing also introduces new risks that the client must manage. <strong>Provider risks<\/strong> are related to the service provider and the services they offer, some of which are transferred from the client to the service provider. These risks are managed by him; however, the client remains responsible and must ensure that the service provider fulfills their obligations effectively. Organizational and technical interfaces are established between the client and provider during outsourcing, which can lead to <strong>interface risks<\/strong>. Clearly defining and assigning responsibilities for risk management is essential in this context.<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15024 size-full\" src=\"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2.png\" alt=\"Risk management in IT Vendor Management\" width=\"1920\" height=\"874\" srcset=\"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2.png 1920w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2-300x137.png 300w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2-1024x466.png 1024w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2-768x350.png 768w, https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Figure2-1536x699.png 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\"><\/p>\n<p style=\"text-align: center;\">Figure 2: Risk management before and after outsourcing<\/p>\n<p>&nbsp;<\/p>\n<h2>Risk Identification for Outsourced IT Services<\/h2>\n<p>It is also important to identify the different categories of risks associated with IT outsourcing. The risk categories help in classifying identified risks and also assist in verifying the completeness of recorded risks. The following categories may occur in particular*:<\/p>\n<ul>\n<li><strong>Strategic Risk:<\/strong> Occurs when the decisions and actions of a service provider are not aligned with the strategic goals of the company.<\/li>\n<li><strong>Operational Risk:<\/strong> Refers to the risk of loss arising from ineffective or faulty processes, employees, controls or systems of a service provider.<\/li>\n<li><strong>Business Continuity Risk:<\/strong> occurs when an external event affects the service provider&rsquo;s ability to continue IT operations, with corresponding impacts on the client.<\/li>\n<li><strong>Compliance and Regulatory Risk:<\/strong> Results from potential non-compliance with laws and regulations by a service provider.<\/li>\n<li><strong>Information Security Risk:<\/strong> Essentially concerns cyberattacks and data breaches that can occur due to security vulnerabilities at service providers.<\/li>\n<li><strong>Financial and Credit Risk:<\/strong> Directly relates to a critical financial situation of the service provider, where they may fail to meet their contractual obligations, i.e., providing products and services as agreed.<\/li>\n<li><strong>Reputational Risk:<\/strong> Encompasses various ways a service provider could damage the client&rsquo;s reputation, brand, or name either directly or indirectly.<\/li>\n<li><strong>Concentration Risk:<\/strong> Occurs when a company relies on too many high-risk or critical services from a single service provider or when there is only one provider in the market offering critical products and services to the client.<\/li>\n<li><strong>Geopolitical Risk:<\/strong> Can arise when the service provider is located in a country that is prone to issues such as political unrest, corruption, or human rights violations.<\/li>\n<li><strong>Environmental Risk:<\/strong> Includes political changes, natural disasters, and other social issues that can impact the service delivery of the service provider.<\/li>\n<\/ul>\n<p><em>* https:\/\/www.venminder.com\/blog\/types-vendor-risks-monitor<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>This list is not exhaustive. Moreover the risks categorized according to risk categories should be recorded in a risk register and managed appropriately, meaning they need to be carefully assessed and suitable measures should be planned and implemented.<\/p>\n<p>&nbsp;<\/p>\n<h2>Sample Risk Mitigation Measures<\/h2>\n<p>Here are some examples of risk mitigation measures for selected risk categories:<\/p>\n<p><strong>Operational Risk<\/strong>:<\/p>\n<ul>\n<li>Clearly define responsibilities and accountabilities to minimize misunderstandings, confusion, and delays.<\/li>\n<li>Specify service levels (KPIs and target values) in the strategy and concept phase to minimize unclear expectations between the client and the service provider.<\/li>\n<\/ul>\n<p><strong>Compliance and Regulatory Risk<\/strong>:<\/p>\n<ul>\n<li>Require standards, certifications, and security systems\/technologies during provider selection.<\/li>\n<li>Implement controls and processes to ensure the provider meets legal and regulatory requirements.<\/li>\n<li>Set KPIs and target values for compliance, establishing regular reporting and review.<\/li>\n<\/ul>\n<p><strong>Business Continuity Risk<\/strong>:<\/p>\n<ul>\n<li>Implementation of a Business Continuity Plan (BCP) by the service provider to ensure the continuation of IT operations in the event of an external incident.<\/li>\n<li>Regular review and updating of the BCP to ensure that it meets current needs and requirements.<\/li>\n<li>Regular testing of the BCP to ensure that it functions effectively in the event of an emergency.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Conclusion &ndash; Risk Management in IT Vendor Management<\/h2>\n<p>In conclusion, risk management in IT vendor management is crucial to ensure the stability, security, and integrity of IT systems and data. Moreover companies, especially in regulated industries like finance, insurance, and critical infrastructure, must adhere to strict regulatory requirements by establishing appropriate risk management procedures and processes.<\/p>\n<p>Furthermore risk management should be integrated into all phases of the outsourcing lifecycle, addressing all relevant risk categories. Companies must clearly define responsibilities to manage risks that arise from working with service providers.<\/p>\n<h2><span style=\"font-size: 14px; font-weight: normal;\">[\/vc_column_text][\/vc_column][\/vc_row]<\/span><\/h2>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text]Risk management in IT vendor management is essential to minimize risks during and after the outsourcing of IT services, ensuring smooth service operations. In today&#8217;s digital world, businesses are increasingly dependent on IT services, making the efficiency and quality of these services critical to their success. In the following, we show how to effectively handle&hellip;<\/p>\n","protected":false},"author":17,"featured_media":10924,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[180,179],"tags":[178],"class_list":["post-15020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-outsourcing","category-it-vendor-management","tag-blog","category-180","category-179","description-off"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Risk Management in IT Vendor Management- amendos gmbh<\/title>\n<meta name=\"description\" content=\"An Overview of how Risk Management for IT Services can be handled especially during the operational phase of IT Vendor Management\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risk Management in IT Vendor Management\" \/>\n<meta property=\"og:description\" content=\"Risk management in IT vendor management is essential to minimize risks during and after the outsourcing of IT services, ensuring smooth service\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/\" \/>\n<meta property=\"og:site_name\" content=\"amendos gmbh\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-09T10:06:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-08T16:09:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Michael Olaolu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michael Olaolu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/\"},\"author\":{\"name\":\"Michael Olaolu\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#\\\/schema\\\/person\\\/6cb3e21e45b8225c7fc0e934310d9ed2\"},\"headline\":\"Risk Management in IT Vendor Management\",\"datePublished\":\"2023-03-09T10:06:52+00:00\",\"dateModified\":\"2024-08-08T16:09:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/\"},\"wordCount\":1216,\"publisher\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Risiko2.jpg\",\"keywords\":[\"Blog\"],\"articleSection\":[\"Outsourcing\",\"IT Vendor Management\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/\",\"name\":\"Risk Management in IT Vendor Management- amendos gmbh\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Risiko2.jpg\",\"datePublished\":\"2023-03-09T10:06:52+00:00\",\"dateModified\":\"2024-08-08T16:09:18+00:00\",\"description\":\"An Overview of how Risk Management for IT Services can be handled especially during the operational phase of IT Vendor Management\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Risiko2.jpg\",\"contentUrl\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Risiko2.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/it-vendor-management\\\/risk-management-in-it-vendor-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Risk Management in IT Vendor Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/\",\"name\":\"amendos gmbh\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#organization\",\"name\":\"amendos GmbH\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Logo-amendos.png\",\"contentUrl\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Logo-amendos.png\",\"width\":353,\"height\":81,\"caption\":\"amendos GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/amendos-gmbh\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/#\\\/schema\\\/person\\\/6cb3e21e45b8225c7fc0e934310d9ed2\",\"name\":\"Michael Olaolu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/amendos-logo-152-150x150.png\",\"url\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/amendos-logo-152-150x150.png\",\"contentUrl\":\"https:\\\/\\\/www.amendos.de\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/amendos-logo-152-150x150.png\",\"caption\":\"Michael Olaolu\"},\"url\":\"https:\\\/\\\/www.amendos.de\\\/en\\\/author\\\/molaolu\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Risk Management in IT Vendor Management- amendos gmbh","description":"An Overview of how Risk Management for IT Services can be handled especially during the operational phase of IT Vendor Management","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/","og_locale":"en_US","og_type":"article","og_title":"Risk Management in IT Vendor Management","og_description":"Risk management in IT vendor management is essential to minimize risks during and after the outsourcing of IT services, ensuring smooth service","og_url":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/","og_site_name":"amendos gmbh","article_published_time":"2023-03-09T10:06:52+00:00","article_modified_time":"2024-08-08T16:09:18+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg","type":"image\/jpeg"}],"author":"Michael Olaolu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michael Olaolu","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#article","isPartOf":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/"},"author":{"name":"Michael Olaolu","@id":"https:\/\/www.amendos.de\/en\/#\/schema\/person\/6cb3e21e45b8225c7fc0e934310d9ed2"},"headline":"Risk Management in IT Vendor Management","datePublished":"2023-03-09T10:06:52+00:00","dateModified":"2024-08-08T16:09:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/"},"wordCount":1216,"publisher":{"@id":"https:\/\/www.amendos.de\/en\/#organization"},"image":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg","keywords":["Blog"],"articleSection":["Outsourcing","IT Vendor Management"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/","url":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/","name":"Risk Management in IT Vendor Management- amendos gmbh","isPartOf":{"@id":"https:\/\/www.amendos.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#primaryimage"},"image":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg","datePublished":"2023-03-09T10:06:52+00:00","dateModified":"2024-08-08T16:09:18+00:00","description":"An Overview of how Risk Management for IT Services can be handled especially during the operational phase of IT Vendor Management","breadcrumb":{"@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#primaryimage","url":"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg","contentUrl":"https:\/\/www.amendos.de\/wp-content\/uploads\/2023\/03\/Risiko2.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.amendos.de\/en\/it-vendor-management\/risk-management-in-it-vendor-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.amendos.de\/en\/"},{"@type":"ListItem","position":2,"name":"Risk Management in IT Vendor Management"}]},{"@type":"WebSite","@id":"https:\/\/www.amendos.de\/en\/#website","url":"https:\/\/www.amendos.de\/en\/","name":"amendos gmbh","description":"","publisher":{"@id":"https:\/\/www.amendos.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.amendos.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.amendos.de\/en\/#organization","name":"amendos GmbH","url":"https:\/\/www.amendos.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amendos.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.amendos.de\/wp-content\/uploads\/2020\/03\/Logo-amendos.png","contentUrl":"https:\/\/www.amendos.de\/wp-content\/uploads\/2020\/03\/Logo-amendos.png","width":353,"height":81,"caption":"amendos GmbH"},"image":{"@id":"https:\/\/www.amendos.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/amendos-gmbh\/"]},{"@type":"Person","@id":"https:\/\/www.amendos.de\/en\/#\/schema\/person\/6cb3e21e45b8225c7fc0e934310d9ed2","name":"Michael Olaolu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.amendos.de\/wp-content\/uploads\/2020\/04\/amendos-logo-152-150x150.png","url":"https:\/\/www.amendos.de\/wp-content\/uploads\/2020\/04\/amendos-logo-152-150x150.png","contentUrl":"https:\/\/www.amendos.de\/wp-content\/uploads\/2020\/04\/amendos-logo-152-150x150.png","caption":"Michael Olaolu"},"url":"https:\/\/www.amendos.de\/en\/author\/molaolu\/"}]}},"_links":{"self":[{"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/posts\/15020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/comments?post=15020"}],"version-history":[{"count":0,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/posts\/15020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/media\/10924"}],"wp:attachment":[{"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/media?parent=15020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/categories?post=15020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.amendos.de\/en\/wp-json\/wp\/v2\/tags?post=15020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}