third party risk management

Key Factors Underlying Third-Party Risk Management

The shift from office-based work to working from home that characterized 2020’s adaptation to COVID-19 lockdowns, has seen soaring digital risks stemming from mishandled third-party risk management.

This at a time where reliance on third-party service providers is so pervasive that the Institute of Collaborative Working estimates that up to 80 percent of direct and indirect operating costs of a business can come from third parties, and up to 100 percent of a company’s revenue from alliance partners, franchisees and sales agents.

Yet, Opinion Matters’ “Global Insights: Supply Chain Cyber Risk–Managing Cyber Risk Across the Extended Vendor Ecosystem” research, published last November, indicates that out of over 1500 CISOs, CIOs, and Chief Procurement Officers from USA, UK, Singapore, Switzerland, and Mexico surveyed:

  • 77% have limited visibility around their third-party vendors
  • 2.7 is the average number of breaches experienced in the past 12 months
  • 80% have suffered a third-party related breach in the past 12 months

Despite this, only 22.5% monitor their entire supply chain.

In 2020 and 2021, third-party risk management flaws led to an expansion of successful attacks, spanning all industries. Such attacks include:

Finestra Bank

March 20, 2020 – A third-party data breach of the London-based bank technology solution Finestra exposed the protected banking information of customers and sent employees home in the thousands as a result of the security breach.

Dave Bank

July 28, 2020 – A third-party data breach of the US digital bank, Dave exposed the protected banking information of over seven million customers.

NorthShore University HealthSystem

September 9, 2020 – A third-party data breach of the Chicago-based healthcare system, NorthShore University HealthSystem exposed the protected health information of 348,000 medical patients.

Fragomen, Del Rey, Bernsen & Loewy

October 27, 2020 – Fragomen, Del Rey, Bernsen & Loewy, the immigration law firm responsible for representing Google, announced that a third party gained access to an undisclosed number of employee Form I9’s.

Vertafore

November 14, 2020 – Over 27 million Texas citizens’ personal and driver’s license data were exposed through a third-party breach of the insurance software firm Vertafore.

Volkswagen Group of America, Inc.

August 2019- May 2021 – 3.3 million people were left vulnerable after it was discovered that a vendor had left unsecured data on the internet. The exposed data varied from contact information to Social Security, and loan numbers.

Kaseya

July 2, 2021 – it was discovered that the REvil ransomware group had exploited a vulnerability in Kaseya VSA, a product commonly used by MSPs to manage their clients IT environments. The attack caused Kaseya to shut down their on-prem and SaaS servers, affecting as many as 1500 companies worldwide.

Unfortunately, this is far from an exhaustive list. These examples merely illustrate that the range of industries targeted is wide and varied.

speak to an expert

Why is Third-Party Risk Management and  Compliance Important?

Even in the absence of a successful breach, failure to adequately assess third-party risks may be costly, as exemplified by last October’s $60 million fine imposed on Morgan Stanley, by the Office of the Comptroller of the Currency. The consent order stated that, in 2016, the bank “failed to adequately assess the risk of using third party vendors, including subcontractors,” and in 2019, it “experienced similar vendor management control deficiencies in connection with the decommissioning of wide area application services devices.”

Preventing such fines requires compliance with an ever-growing number of regulations, including CaCPA, PCI, NIST, ISO, SIG, HIPAA, and GDPR.

In addition to risking fines for non-compliance, improperly managed third party risks open the door to damage suits. On March 15, 2021, the National Law Review stipulated that “data breach class actions where the data at issue were exposed and improperly accessed by unrelated third parties” could potentially “expose businesses and governments to an increased risk of data privacy and data breach class actions.”

Information security

Information security relates to all measures taken to preserve the confidentiality, integrity, and availability of data, information, and operating systems.
Improving your organization’s security posture requires tightening not only the on-premise security infrastructure, but also factoring in third-party vendor risk management, including:

Data privacy risk

Mitigating privacy risks requires meeting standards exceeding the existing compliance requirements in a specific area as the regulatory compliance landscape is constantly evolving.
The latest US privacy law regulation map published by the IAAP (International Association of Privacy Professionals) provides a visual illustration of the rapidly expanding privacy regulations.

With the combination of increased third-party risks and greater complexity of compliance requirements, it is no wonder that “52% of legal and compliance leaders are concerned about third-party cyber risks due to remote work since COVID-19.”(Gartner)

For help with data security risk contact us

Operational Risk

Third-party risk management should also cover vetting the vendor’s own security posture. Aside from being a potential vector of attack to your organization, external vendors also provide services necessary to run your service or business.
If your vendor system shuts down following a successful cyberattack, it might catastrophically impact your own business.

Reputational Risks

For your clients and customers, news that your organization has been breached decreases their trust in your brand. The breach might have originated from an external vendor, but it does nothing to protect your brand’s name for users, clients, and customers.
Even without a breach, third-party vendors are invisible to your users, so their poor performance is attributed to your brand.
Checking vendors’ reliability, ability to scale and provide continuous, uninterrupted services with consistent quality is an integral part of the selection process.

Financial risk

Aside from the financial risk pertaining to a vendor breach or operational flaws, sound third-party vendor risk management needs to consider their service cost fluctuations, in case of increased or decreased demands to avoid unexpected cost rise.

So when wondering why third-party risk management is on you, keep in mind that:

  • Your organization is legally responsible for monitoring vendors’ compliance and data security privacy and security management, making your organization liable for their flawed risk management.
  • A breach in your vendor security infrastructure might generate legal, punitive, operational, and reputational costs for your organization if their breach leaks into your system.
  • A flaw in their ability to provide service might impact your operational continuity with the ensuing cost of loss of business.
    Any of the above occurrences might negatively affect your brand’s reputation.
  • As the purpose of monitoring third-party cyber and compliance soundness is to prevent any of this. So, when selecting vendors, it is a rational policy to establish contingency plans.

 

Get in touch with HolistiCyber for more information on third party risk management

HolistiCyber

HolistiCyber enables organizations in their cyber defense challenge, providing them with state-of-the art consultancy, services & solutions to help them proactively and holistically defend themselves in a new era of constantly evolving cyber threats, many of which lead to nation state grade attacks. 

Learn more…

Share:

We use cookies to provide the services and features offered on our website, and to improve our user experience.