Third-Party Supply Chain Risk During The COVID-19

Contributors

Laszlo S. Gonc
Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence
Image
Third-Party Supply Chain Risk During The COVID-19

Organizations – public and private – have felt the impact of the COVID-19 outbreak on our supply chains as suppliers have diminished workforces and capacity. While cybersecurity threats may appear less of a priority, hackers and cyber attackers are leveraging the headlines to swiftly escalate their attacks across most industries, including healthcare, banking, retail, and entertainment.

“CYFIRMA’s threat visibility and intelligence research revealed a massive increase of over 600% of cyberthreat indicators related to the Coronavirus pandemic from February to early March.”

Many businesses today tend to have a higher dependency on outsourced products, services, and tools to maintain ongoing operations. These services and tools can include hybrid cloud environments, hosted websites, external applications, mobile apps, and cloud storage services. This results in a higher risk exposure to critical services and potentially your sensitive data.

During this critical time, it’s important to engage and have an honest dialogue with your suppliers on business continuity and cybersecurity risk.

  1. Establish a Strong Communication Channel: Establish a strong communication channel with your suppliers. It is essential for a successful partnership. Ensure you have established a clear and transparent process with a single point of contact. Begin with setting expectations and defining the related processes for refining and enforcing them. From a security standpoint, set those expectations with a clear understanding of what your vendor will do and how their activities and responsibilities can create potential security issues for your organization, in turn letting them know the potential issues.
  2. Cybersecurity Awareness: Your third-party suppliers, especially smaller organizations, may not be aware of the increased cyber threats. Be proactive through regular meetings and creating an established channel to share vetted information they can use to avoid phishing and other forms of cyber-attacks. Create a dashboard of reporting metrics to monitor your critical supply chain partners.
  3. Business Continuity: Some third-party suppliers to your organization’s operations may be determined critical. If they should be adversely affected, you may risk a loss to certain areas of your business operations. Engage your third-party suppliers and ask what they are doing to ensure their operations continue in the face of adverse events. Like cybersecurity awareness, partner with them to share vetted information for best practices in ensuring they have resources to cope with these types of challenges.
  4. Risk and Controls: Moving operations to alternative locations and external providers carries increased risks. It is important to understand your regulatory and compliance landscape, inventory and understand the critical services and sensitive information your third-party supplier handles. Beyond conducting risk assessments with your suppliers, partner with them to monitor and assess cybersecurity risks, especially when there is a change in the relationship, product, or service. In many cases, the regulatory and compliance liability remains with your organization.
  5. Centralized Assessment: Centralizing your assessment of supplier risk and resilience during periods of disruption and heightened risk represents a major operational advance for many. Third-party data breaches may force your organization to respond to incidents that are outside of your control or originate from an indirect source. Regardless of obligation, your organization may suffer significant reputational damage as a result of the incident.

FOUR (4) THINGS TO DO NOW TO ADDRESS THIRD PARTY RISK

  1. Communication: Establish clear and transparent processes, set expectations.
  2. Cybersecurity Awareness: Partner with suppliers to understand the risks.
  3. Business Continuity: Understand the impact to your business if your supplier is interrupted.
  4. Risk and Controls: Understand the regulatory and compliance landscape, monitor compliance.

 

Get the latest insights straight from our desk to your inbox.

Featured Articles

Explore more →
Image
Whitepaper: Ransomware Threat Management

Whitepaper: Ransomware Threat Management

Ransomware continues to be a real threat to business operations across all industries, no organization is safe from this threat.

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view
Image
Cybersecurity Incident Response Preparedness

Cybersecurity Incident Response Preparedness

An incident response framework provides a structure to support incident response operations. A framework typically provides guidance on what needs to be done, but not on how it is done.

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view
Image
Internet of Things

IoT Medical Device Cybersecurity

Healthcare data and medical devices would be aggressively targeted by ransomware attacks since early 2017 has proven to be true

Laszlo S. Gonc
CISSP, First Senior Fellow, DivIHN Cybersecurity Center of Excellence view