This post discusses the critical importance of implementing an effective third-party risk mitigation strategy