What does effective third-party risk management actually require for a UK FCA-regulated firm — given the SYSC 8 outsourcing framework, the PRA’s Supervisory Statement SS2/21 on outsourcing and third-party risk management, the Bank of England, FCA and PRA’s developing Critical Third Party regime under FSMA section 312L, the cloud concentration concerns that have driven much of recent supervisory attention, and the cross-border complications introduced where UK firms also fall within the scope of EU DORA?
Third-party risk management has moved from a back-office procurement function to one of the central regulatory priorities for UK financial services firms. The reasons are structural and well understood: financial firms have become deeply dependent on third-party providers — cloud hyperscalers, SaaS platforms, payment networks, market data providers, custodians, transfer agents, fund administrators, technology operations partners, and many others — to deliver essentially every customer-facing service. The concentration of that dependency on a small number of providers (particularly the cloud hyperscalers Amazon Web Services, Microsoft Azure, and Google Cloud, which collectively support a very large share of UK financial services workloads) has created systemic concerns that no individual firm can address through its own arrangements alone. The supervisory response has been to develop both firm-level requirements (under SYSC 8 and PRA SS2/21) and a new direct oversight regime for the most critical third parties (the UK Critical Third Party regime under FSMA s312L and parallel FCA / PRA / Bank of England rules).
The firm-level expectations on third-party risk have intensified materially. The PRA’s SS2/21, published in March 2021 with full implementation expected by 31 March 2022, set out a comprehensive framework covering the full third-party relationship lifecycle: pre-contractual due diligence and risk assessment, the contractual provisions firms must include in third-party arrangements, ongoing monitoring of third-party performance and risk, contingency planning for third-party failure, exit strategies that allow firms to terminate arrangements without disruption, and governance arrangements that ensure executive accountability for third-party risk. The FCA’s SYSC 8 chapter sets out parallel expectations applicable to FCA-only firms and includes specific outsourcing provisions, materiality assessments, and notification requirements. Together with the operational resilience framework (SS1/21 and SYSC 15A), these provisions create a substantial regulatory perimeter around how firms manage their third-party dependencies.
The Critical Third Party regime introduces something genuinely new to UK financial regulation: direct supervisory oversight of unregulated third-party providers whose services are systemically important to the UK financial system. Under FSMA section 312L (introduced by the Financial Services and Markets Act 2023), HM Treasury can designate a third party as a Critical Third Party where its services to UK financial entities are sufficiently systemic that disruption could threaten financial stability or market integrity. Once designated, CTPs become subject to direct oversight by the Bank of England, FCA, and PRA, with rule-making powers to impose specific resilience requirements. The CTP regime addresses, in the UK context, the same systemic concentration risk that EU DORA’s Critical ICT Third-Party Service Provider (CTPP) regime addresses for the EU. UK firms operating across both jurisdictions face the prospect of supplier relationships subject to two parallel direct oversight regimes.
This guide sets out what UK third-party risk management requires in practice, what the SYSC 8 and PRA SS2/21 frameworks expect, how the lifecycle approach to third-party relationships works, what the Critical Third Party regime introduces and how it operates, where DORA cuts across UK arrangements for cross-border firms, what the common failings are, and what the recruitment implications are for firms building or strengthening their third-party risk function. It is written for senior risk leaders, Heads of Operational Resilience, Heads of Procurement, Chief Operating Officers, Heads of Outsourcing, and the senior managers under SMCR who hold accountability for third-party risk in UK FCA-regulated firms.
It is written from the perspective of FD Capital’s team — a specialist finance recruitment firm placing senior risk, operations, and compliance leaders into UK FCA-regulated firms since 2018, including substantive engagement with Head of Third-Party Risk, Head of Outsourcing, and senior operational resilience appointments where third-party risk oversight forms a significant part of the role.
Call 020 3287 9501 or email recruitment@fdcapital.co.uk to discuss third-party risk management senior recruitment, including Heads of Third-Party Risk, Heads of Outsourcing, and Operational Resilience leadership where third-party risk is a primary responsibility.
Fellow of the ICAEW | Placing Heads of Third-Party Risk, Heads of Outsourcing, and senior operational resilience leaders into UK firms managing material third-party dependencies under SYSC 8, PRA SS2/21, and the developing Critical Third Party regime
Our network includes senior third-party risk professionals with substantive UK regulatory experience — across SYSC 8 outsourcing, PRA SS2/21 implementation, cloud outsourcing, vendor lifecycle management, exit strategies, concentration risk analysis, and the cross-border challenges of operating under both UK and EU DORA frameworks. Adrian Lawrence FCA personally screens senior candidates. 4,600+ network. 160+ senior placements.
The UK Regulatory Framework for Third-Party Risk
UK third-party risk management requirements rest on a combination of FCA Handbook provisions, PRA supervisory statements, and the Critical Third Party regime under FSMA s312L. Understanding how these elements interact is essential for senior risk leaders.
FCA SYSC 8 — Outsourcing. The FCA’s outsourcing chapter sits within the Senior Management Arrangements, Systems and Controls sourcebook. SYSC 8 applies to all FCA-regulated firms (with proportionate application to smaller and less complex firms) and sets out the requirements where firms outsource the performance of operational functions. The chapter distinguishes between “critical or important operational functions” — outsourcing arrangements that warrant heightened attention given their criticality to the firm — and other arrangements. For critical or important outsourcing, SYSC 8 requires firms to take reasonable steps to avoid undue additional operational risk, to ensure the outsourced provider has the ability and capacity to perform the functions reliably, to monitor the provider’s performance, to maintain appropriate contingency arrangements, and to ensure the firm itself retains the necessary expertise to oversee the provider effectively.
PRA SS2/21 — Outsourcing and Third Party Risk Management. The PRA’s Supervisory Statement applies to PRA-regulated firms (banks, building societies, designated investment firms, insurers). SS2/21 takes a broader view than SYSC 8, addressing not only formal outsourcing arrangements but the wider universe of third-party relationships through which firms deliver operations. The supervisory statement is structured around the third-party relationship lifecycle: governance and accountability; pre-contractual due diligence and risk assessment; contractual provisions; ongoing monitoring; business continuity and exit; and supervisory engagement. SS2/21 took effect on 31 March 2022 with full implementation expected over a transitional period. The PRA has continued to develop guidance and supervisory practice in this area since.
FCA Operational Resilience and Third-Party Risk. The FCA’s operational resilience framework in SYSC 15A intersects with third-party risk management. Firms must map the resources supporting their important business services — including third parties — and must understand how third-party disruption could affect their ability to remain within impact tolerances. The mapping requirement has driven substantial uplift in firms’ visibility of their third-party dependencies, particularly the indirect dependencies that emerge through the third party’s own supply chain.
The Critical Third Party (CTP) regime. Section 312L of FSMA (introduced by the Financial Services and Markets Act 2023) gives HM Treasury the power to designate third parties as Critical Third Parties where their services to UK financial entities are sufficiently systemic. Once designated, CTPs become subject to direct oversight by the Bank of England, FCA, and PRA, who have rule-making powers to impose specific resilience requirements on designated CTPs. The regime was developed through the Bank of England Discussion Paper DP3/22 (“Operational resilience: critical third parties to the UK financial sector”), subsequent consultation papers, and joint policy statements published in 2024-2025. The CTP regime represents a fundamental change in UK financial regulation — for the first time, providers who are not themselves authorised firms can be subject to direct supervisory oversight.
EU DORA and UK Firms. Where UK firms have EU operations, EU subsidiaries, or material service relationships with EU financial entities, the EU’s Digital Operational Resilience Act (Regulation (EU) 2022/2554) creates parallel and sometimes overlapping obligations. DORA’s Pillar 4 on ICT third-party risk sets out detailed requirements that go beyond UK SYSC 8 / SS2/21 in some respects (particularly the Register of Information requirement and the specific contractual provisions in Article 30). Cross-border firms typically build integrated frameworks that meet the higher of the two standards on each specific requirement.
The Third-Party Relationship Lifecycle
Effective third-party risk management is best understood as a lifecycle discipline: distinct activities at different stages of the relationship, each with specific requirements and governance.
Pre-Contract: Due Diligence and Risk Assessment
The pre-contract phase is where many third-party risk failures originate. Due diligence that is too superficial, risk assessment that is conducted formulaically rather than substantively, or commercial pressure to complete the relationship quickly can all produce arrangements that are operationally inadequate from inception.
Substantive pre-contract activity typically includes: assessment of the criticality of the function being outsourced (to determine the intensity of the rest of the process); financial due diligence on the provider’s stability and resilience; operational due diligence on the provider’s systems, controls, and management; security due diligence including penetration testing where appropriate; review of the provider’s own third-party arrangements (the “fourth party” question); reference checking with the provider’s existing clients; assessment of concentration risk from the provider’s perspective (whether the firm is taking on excessive exposure to a single provider) and from the firm’s perspective (whether the provider’s other commitments leave it adequately able to serve this firm); and assessment of substitutability (whether alternative providers exist if the relationship needs to be terminated).
The risk assessment that emerges from due diligence informs the contractual provisions, the ongoing monitoring intensity, and the exit strategy. The same assessment, properly maintained, also informs the firm’s mapping of important business services under operational resilience requirements.
Contractual Provisions
The contractual provisions in third-party arrangements determine the firm’s rights and the provider’s obligations throughout the relationship. SS2/21 and SYSC 8 set out specific provisions that firms must include in critical or important arrangements, and DORA’s Article 30 prescribes additional provisions for ICT third-party arrangements.
Key contractual provisions typically include: clear specification of the services and the locations from which they will be provided; service level agreements with measurable performance standards; provisions on confidentiality, data protection, and information security; rights for the firm to monitor the provider’s performance; rights of access for the firm, the firm’s auditors, and supervisory authorities; cooperation obligations during audits and supervisory engagements; specific termination rights; provisions on assistance during transition out of the relationship; defined exit strategies including transition periods; provisions on the provider’s own use of subcontractors; and notification obligations on the provider for events affecting service delivery.
Contractual provisions matter most when relationships go wrong. A well-drafted contract provides the legal mechanisms to address performance issues, conduct supervisory examinations, and effect orderly exit. A poorly-drafted contract can leave the firm exposed when problems emerge — without the rights of access needed to investigate, without the termination provisions needed to exit, or without the support obligations needed during transition.
Ongoing Monitoring and Performance Management
Once contracted, the third-party relationship requires ongoing monitoring proportionate to the criticality of the services. Monitoring activities typically include: periodic review of the provider’s performance against agreed service levels; receipt and review of regular service reports from the provider; periodic on-site or virtual reviews of the provider’s operations; review of the provider’s own audit reports and certifications (SOC 2 reports, ISO 27001 certifications, ISAE 3402 reports); periodic re-assessment of the provider’s financial stability; monitoring of any incidents affecting the provider; ongoing assessment of concentration risk as the provider’s client base evolves; and engagement on any material changes to the provider’s services or operations.
Monitoring intensity should be calibrated to the criticality of the services. A provider supporting a critical important business service should be subject to more intensive monitoring than a provider supporting peripheral functions. The monitoring approach should be documented in the firm’s third-party risk framework and should be capable of identifying issues before they become acute.
Business Continuity and Contingency Planning
Despite all efforts, third parties sometimes fail. Business continuity and contingency planning addresses what happens when a third party experiences disruption — whether short-term outage, longer service degradation, financial difficulty, or outright failure.
Effective contingency planning includes: identification of services that could be brought in-house if necessary; identification of alternative providers who could substitute for the current arrangement; pre-agreed arrangements with alternative providers where practicable (sometimes called “warm” or “hot” alternative arrangements); business continuity arrangements that allow services to continue during short-term disruption; testing of contingency arrangements through scenario exercises; and maintenance of the institutional knowledge needed to execute contingency plans rapidly.
Firms that have not invested in substantive contingency planning typically discover the gap when they need it. Firms with strong contingency planning are not immune to third-party disruption, but they recover faster and with less customer impact.
Exit Strategy
Exit strategy planning is the discipline of ensuring the firm can terminate a third-party relationship without operational disruption. Planning happens at the start of the relationship, not at the point of exit, because the contractual provisions and operational arrangements need to support exit when it becomes necessary.
Substantive exit planning includes: documentation of how services would be migrated to an alternative provider or brought in-house; specification of the support the current provider would provide during transition; agreed transition periods of sufficient length; data migration arrangements ensuring the firm retains ownership of and access to its data; intellectual property arrangements ensuring the firm retains the ability to use any provider-developed materials necessary for ongoing operations; and periodic exit testing to ensure the planned arrangements would actually work in practice.
The PRA’s SS2/21 and the FCA’s SYSC 8 both emphasise exit strategy as a substantive requirement rather than a formality. Supervisors have increasingly tested firms’ exit strategies through specific reviews, and have found weaknesses in many firms — particularly around data extraction, the practical workability of “alternative provider” assumptions, and the realism of transition timing.
The UK Critical Third Party (CTP) Regime
The Critical Third Party regime is the most significant new development in UK third-party risk regulation. Established through Section 312L of FSMA (introduced by the Financial Services and Markets Act 2023), the regime addresses the systemic risk that arises from the financial sector’s concentration of dependency on a small number of major third-party providers.
Designation criteria. HM Treasury can designate a third party as a Critical Third Party where its services to UK financial entities meet criteria including the materiality of the services to the financial entities relying on them, the systemic importance of those financial entities, the substitutability of the third party’s services, the geographic concentration of dependency, and the systemic implications of disruption to the third party’s services. The designation process involves consultation between HM Treasury and the Bank of England, FCA, and PRA. The criteria are designed to capture the providers whose disruption could threaten financial stability or market integrity.
Joint regulator oversight. Once designated, CTPs become subject to oversight by the Bank of England, FCA, and PRA (jointly, “the regulators”). The regulators have rule-making powers to impose specific resilience requirements on designated CTPs, including requirements relating to governance, risk management, business continuity, incident management, testing, and information sharing. The regulators can also require designated CTPs to provide specified information, can conduct examinations and reviews, and can require remedial action where deficiencies are identified.
Enforcement. The CTP regime includes enforcement mechanisms enabling the regulators to take action against designated CTPs that fail to comply with the requirements imposed on them. The specific enforcement architecture has been developed through the regulators’ policy statements and continues to evolve as the regime beds in.
Implications for financial entities. For UK financial entities consuming services from designated CTPs, the regime brings additional supervisory oversight of their key providers. The financial entity’s own SYSC 8 / SS2/21 obligations remain — the CTP regime supplements rather than replaces firm-level third-party risk management — but the financial entity benefits from the additional resilience that direct CTP oversight is intended to deliver.
Comparison with EU DORA. The UK CTP regime addresses similar systemic risks to those addressed by DORA’s Critical ICT Third-Party Service Provider regime, but through a different supervisory architecture. UK CTPs face direct oversight by the UK regulators; DORA CTPPs face direct oversight by an EU Lead Overseer (one of the three ESAs). Some providers may be designated under both regimes, creating parallel direct oversight obligations. The two regimes are not perfectly aligned in their substantive requirements, and providers operating across both jurisdictions face the practical challenge of compliance with overlapping but distinct expectations.
Cloud Outsourcing — A Distinct Sub-Discipline
Cloud outsourcing has emerged as a distinct sub-discipline within third-party risk management given its scale, criticality, and concentration. The FCA published cloud-specific guidance in FG16/5 (“Guidance for firms outsourcing to the cloud and other third-party IT services”) and has continued to engage with cloud questions through subsequent supervisory work. The PRA’s SS2/21 includes specific cloud provisions.
The distinct features of cloud outsourcing that require specific attention include: the very high concentration of UK financial sector cloud workloads on three providers (AWS, Azure, Google Cloud); the operational architecture of cloud services that makes some traditional contractual provisions difficult to apply (cloud providers typically use standard contracts that they will not negotiate substantively); the data residency and sovereignty questions that cloud raises (where exactly is the data, who has access to it, what laws apply); the supply chain complexity of cloud where the cloud provider itself uses substantial third-party services; and the systemic resilience question about whether the cloud platform’s own resilience is adequate for financial system criticality.
UK firms have developed substantial cloud risk management capabilities including dedicated cloud architecture teams, cloud security functions, cloud-specific contractual frameworks, and cloud-specific contingency planning. The concentration risk dimension — what happens if AWS, Azure, or Google Cloud experiences material disruption — is partly mitigated through the CTP regime (these providers being prime candidates for CTP designation) and partly through firm-level multi-cloud and exit arrangements.
Concentration Risk Analysis
Concentration risk is the systemic dimension of third-party risk: the risk that arises when many firms depend on the same third party, such that that third party’s failure would have implications across the financial system rather than just for individual firms. Concentration analysis is therefore a discipline that operates both at firm level (the firm’s own concentration of exposure to specific providers) and at system level (the financial sector’s collective concentration).
Firm-level concentration analysis typically considers: the firm’s exposure to specific providers across multiple service lines (where one provider supports several distinct functions, the firm’s exposure is correspondingly higher); the firm’s exposure to providers in the same supply chain (where multiple providers depend on the same underlying infrastructure); the geographic concentration of the firm’s third-party dependencies (where multiple providers operate from the same location, regional disruption could affect multiple services simultaneously); and the firm’s exposure to providers who serve many financial firms (where the provider’s failure would be a systemic event with broader implications than just the firm).
System-level concentration analysis is conducted primarily by the regulators, including through the data they collect from firms about their third-party arrangements, the information shared through the FCA’s outsourcing reporting requirements, and the analysis informing CTP designation decisions. The regulators’ published analysis has consistently shown high levels of cloud concentration and has informed both the CTP regime design and the regulators’ supervisory engagement.
Common Failings in Third-Party Risk Management
Specific patterns of failing recur across the regulated population. Recognising these patterns supports both prevention and remediation when issues do arise.
Inadequate inventory of third-party arrangements. Firms that do not maintain a complete and current inventory of their third-party arrangements cannot manage them effectively. Inventories that exclude departmental arrangements made outside central procurement, that do not capture sub-contracted relationships, or that have not been refreshed recently will miss material exposures.
Formulaic risk assessment. Risk assessments conducted as form-filling exercises rather than substantive analytical work tend to produce homogenised outputs that don’t reflect the actual risk profile of specific arrangements. Substantive risk assessment requires investment of analytical capacity and willingness to reach uncomfortable conclusions about specific arrangements.
Boilerplate contractual provisions without business-specific tailoring. Standard contractual templates can produce arrangements that meet the letter of regulatory requirements but lack the specific provisions needed to manage particular risks. Business-specific tailoring is essential for material arrangements.
Monitoring that doesn’t actually monitor. Monitoring arrangements that produce reports without producing insight, that consume governance time without informing decision-making, or that focus on compliance dimensions while missing operational ones, are a common failing. Effective monitoring is calibrated to actual risk and produces outputs that drive action.
Theoretical exit strategies. Exit strategies that exist on paper but have not been tested often turn out to be substantially less workable than assumed. Firms should test exit strategies — through tabletop exercises if not full execution — to validate that the planned arrangements would actually work.
Concentration risk underweighted. Firms whose third-party risk frameworks treat each arrangement individually may miss the concentration risk that emerges when many arrangements depend on the same underlying provider or infrastructure. Concentration analysis is a distinct discipline that requires explicit attention.
Cloud arrangements managed differently. Some firms have managed cloud arrangements through pathways that bypass their normal third-party risk frameworks — typically because cloud arrangements began as IT decisions rather than as outsourcing decisions. Bringing cloud into the standard framework, with appropriate cloud-specific provisions, is essential for substantive risk management.
Inadequate group oversight. Where firms operate within groups, third-party arrangements made at group level may not receive the firm-level oversight that the firm’s own regulatory obligations require. Group-level arrangements need firm-level governance recognition.
Recruitment Implications — Third-Party Risk Roles UK Firms Need
The third-party risk framework drives demand for several distinct senior roles across UK FCA-regulated firms.
Head of Third-Party Risk Management. The senior leader of the firm’s third-party risk function. Typically reports to the Chief Risk Officer or Chief Operating Officer, with overall responsibility for the firm’s third-party risk framework, the inventory of third-party arrangements, the risk assessment and onboarding processes, the ongoing monitoring discipline, the contingency and exit planning, and the supervisory engagement on third-party matters. For larger firms, this is a substantial senior role.
Head of Outsourcing. Where firms have substantial formal outsourcing arrangements, a dedicated Head of Outsourcing role typically owns the strategic and operational management of those arrangements. Often combined with broader vendor management or third-party risk responsibilities in smaller firms.
Head of Operational Resilience (with TPR remit). Operational resilience leadership in many firms includes substantial third-party risk responsibility given the way the two frameworks interact. Heads of Operational Resilience with strong third-party risk capability are particularly valuable.
Cloud Risk Manager / Head of Cloud Risk. Larger firms increasingly establish dedicated cloud risk roles given the distinct sub-discipline cloud outsourcing has become. These roles typically combine technical cloud architecture knowledge with risk and regulatory expertise.
Vendor Risk Manager. Operational team leadership roles within third-party risk functions, typically focused on the day-to-day execution of due diligence, monitoring, and contractual management for specific portfolios of vendors.
Third-Party Risk Officer / Senior Third-Party Risk Analyst. Specialist analytical roles supporting the senior team, with responsibility for risk assessments, ongoing monitoring outputs, concentration analysis, and supervisory data submissions.
The recruitment market for these roles has tightened materially as the regulatory framework has intensified. Senior candidates with substantive UK regulatory experience, particularly in cloud and complex outsourcing arrangements, command premium compensation. The cross-border dimension — candidates who can navigate both UK SYSC 8 / SS2/21 and EU DORA — has become a particularly valuable specialism.
How FD Capital Works on Third-Party Risk Recruitment
FD Capital places senior risk, operations, and compliance leaders into UK FCA-regulated firms, including substantive engagement with Third-Party Risk recruitment across the regulated population. Our network includes senior third-party risk professionals with UK regulatory experience across SYSC 8 outsourcing, PRA SS2/21 implementation, cloud outsourcing, vendor lifecycle management, exit strategy development, concentration risk analysis, and the cross-border challenges of operating under both UK and EU DORA frameworks.
Adrian personally screens candidates for senior third-party risk placements given the specialist nature of the discipline and the regulatory consequences of getting senior risk hires wrong. Initial introduction is typically within 48 hours for urgent requirements, with full shortlist within five working days for specific assignments.
Initial consultation is confidential and at no charge. Call 020 3287 9501 for an immediate Third-Party Risk senior recruitment requirement, or email recruitment@fdcapital.co.uk.
Related Reading
- Operational Resilience: A Complete UK Guide — UK SS1/21 and SYSC 15A operational resilience framework intersecting with third-party risk
- DORA: Digital Operational Resilience Act UK Guide — EU DORA framework including Pillar 4 third-party risk requirements
- Operational Resilience Recruitment — operational resilience leadership recruitment
- Regulatory Reporting: A Complete UK Guide — UK regulatory reporting framework
- SMCR: The Senior Managers and Certification Regime Explained — UK senior management framework relevant to third-party risk accountability
- Recruitment for FCA Regulated Firms — specialist recruitment for FCA-regulated firms
FD Capital Recruitment Services
- Operational Resilience Recruitment — operational resilience and adjacent third-party risk roles
- Chief Risk Officer Recruitment — CRO recruitment
- Risk and Compliance Recruitment — broader risk and compliance recruitment
- Chief Compliance Officer Recruitment — CCO and Compliance Director recruitment
- FCA-Regulated Firms Recruitment — specialist FCA-regulated firms practice
- Regulatory Reporting Recruitment — adjacent regulatory roles
External References
- FCA Handbook — SYSC 8 — the FCA’s outsourcing requirements
- PRA SS2/21 — Outsourcing and Third Party Risk Management Supervisory Statement
- Bank of England DP3/22 — Critical Third Parties to the UK Financial Sector Discussion Paper
- FCA FG16/5 — Guidance for firms outsourcing to the cloud and other third-party IT services
- Financial Services and Markets Act 2023 — including section 312L creating the Critical Third Party regime
- Regulation (EU) 2022/2554 (DORA) — including Pillar 4 ICT third-party risk requirements
- ICAEW — professional body for Chartered Accountants
About the Author
Adrian Lawrence FCA is the founder of FD Capital Recruitment and a Fellow of the Institute of Chartered Accountants in England and Wales (ICAEW member record). Adrian holds a BSc from Queen Mary College, University of London and an ICAEW practising certificate in his own name.
FD Capital has been placing senior risk, operations, and compliance leaders into UK FCA-regulated firms since 2018 — including substantive engagement with Head of Third-Party Risk recruitment, Head of Outsourcing recruitment, Cloud Risk Manager appointments, and senior operational resilience leaders where third-party risk forms a primary responsibility. Our network includes senior professionals with substantive UK regulatory experience across SYSC 8 outsourcing, PRA SS2/21 implementation, cloud outsourcing, vendor lifecycle management, exit strategy development, concentration risk analysis, and the cross-border challenges of operating under both UK and EU DORA frameworks. Adrian personally screens senior candidates for third-party risk placements given the specialist nature of the discipline. FD Capital Recruitment Ltd (Companies House 13329383) is associated with Adrian’s ICAEW registered Practice.
Speak to FD Capital about third-party risk senior recruitment: Call 020 3287 9501 or email recruitment@fdcapital.co.uk.




