Thank you to all guests and attendees at our latest Cybovent event, “Bridging the Gap Between Regulation and Risk.” Click here to watch the recording if you missed it:
Organizations have to grant access to their systems or hand over data to their third parties so they can provide their services. This results in a significant increase in their surface for cyber-attacks. 67% of organizations surveyed by Forrester experienced a third-party risk incident in 2021 (ref.).
As every organization has to manage cyber risks resulting from internal resources, it is crucial to also keep in mind the risks resulting from their third parties. Recent cyber incidents and analyst reports underline the increasing need to consider these external risks in modern cyber risk management programs.
Nevertheless, the management of risks related to third parties can be different from the management of internal risks:
To get insight, there are,in general, two approaches an organization can follow to evaluate the cyberrisk resulting from a third party:
Both approaches have value, but when used only by themselves, there are significant disadvantages.
But what can organizations do about this? Is it really necessary to choose between “slow” and “inaccurate”? The good news is: No, organizations don’t have to choose. There are many ways to optimize.
First of all, there are many ways to reduce the effort resulting from “Inside-Out” Assessments.
Secondly, organizations can combine the two basic approaches and use an “Outside-In” approach to prioritize assessments. So, they can focus their time and effort on the critical risks that might harm their business.
And finally, organizations can define a level of risk they accept in respect to preventing an event from occurring. For a customer it is close to impossible to prevent a highly targeted attack like to one carried out via SolarWinds back in 2020. For these kinds of attacks, it makes much more sense to strengthen an organization’s cyber resilience by integrating a specific third party view into existing measures to detect, deal with and quickly recover from a cyber-attack.
This is the first issue of our CISO READ whitepaper on third party cyber risk management (TPCRM). There will be another one containing recommendations on how to integrate TPCRM into existing processes like purchasing, ISMS or Vendor Risk Management in general. Stay tuned.
If you want to have a chat with us about the topic, reach out to us. We are happy to help improving your process and come up with ideas.