Strategically Manage Vendor Risk And Cybersecurity Posture

Transcription

Strategically ManageVendor Risk andBuild a StrongerCybersecurity Posture

VENDOR RISK MANAGEMENT PROVIDES VALUE EVENBEFORE RISK EVENTS OCCUR. IT REDUCES THEIRLIKELIHOOD AND SEVERITY, AND IT WILL REASSURECUSTOMERS AND PARTNERS WHO WANT TOSEE YOUR RISK PROFILE BEFORE INVESTINGOR TRANSACTING.Cleverly manage those thatmanage your sensitive dataWhy does Vendor RiskManagement matter?For most modern businesses, Vendor RiskManagement (VRM) is increasingly important asthe number of cyberattacks and data breachessuffered by organizations large and small continuesto grow. These risks will no doubt continue andalmost certainly intensify in their frequency,sophistication and severity.Businesses that can’t protect their data face the prospectof losing the value they can generate from it. Worse, theyface potential financial, reputational and legal harms ifthey are breached and the data stolen, not to mention theharms done to the subjects of the data breach.Yet for all their significance, many companies remainvulnerable to these attacks. In its October 2017 GlobalState of Information Security Survey (GSISS), PwCnotes that while breaches have become morecommon, “many organizations worldwide stillstruggle to comprehend and manage emerging cyberrisks in an increasingly complex digital society. Asour reliance on data and interconnectivity swells,developing resilience to withstand cyber shocks has never been more important.”1Vendor Risk Management focuses its attention onmanaging the risks emerging from third- and evenfourth-party vendors. Unlike SRM, which focuses onphysical supply chains, VRM focuses on “logical”or “information” supply chains.Critically, Vendor Risk Management is an importanttool for protecting data. As the global economy andthe companies, governments and other organizationsit comprises become increasingly digitized, we aregathering more data on customers and employeesalike – shopping histories, browsing and readinghabits, health and legal information, and more. Thisdata is a rich source of value, so managing the risksaround it is vital.2And businesses are not prepared. PwC further notesthat 44% of respondents to its GSISS survey don’t havean information security strategy in place, and 39%expect “loss or compromise of sensitive data” to be aconsequence of a successful cyberattack.2 Third-partyvendors like AWS, Google, and Microsoft offer cloudbased services that play a key role for many modernorganizations. They provide backup, storage, computing,analytics, business process automation, informationpublishing and more using consumption-based,“as-a-service” (aaS) delivery models. They also integratewith “on-premises” systems to create hybrid servicesin cases where important data, highly sensitive dataor processes must be stored or handled locally.BEING COMPLIANT IS NOT THE SAME ASBEING SECURE.It’s a model that’s only going to grow. Research byIDC found that “the global public cloud servicesmarket grew by 28.6% year over year in the first halfof 2017 Organizations not on the public cloudwill be increasingly isolated.”3 This is a slow burn –businesses have been sharing and processing datafor some time and it’s now occurring on a vast scale,which makes managing these relationships, and therisks attached to them, more important than ever.Strategically Manage Vendor Risk and Build a Stronger Cybersecurity Posture

As always, the starting point is to cleverly integrateeffective risk management practices into your internalsystems and processes. These practices should thenbe extended to the third parties that you deal with.Such measures come to the fore in highly regulatedindustries, but even in less-regulated (or non-regulated)verticals, businesses must guard themselves againstexposure to vendor-based risk.A DATA BUSINESS IS A RISKY BUSINESSCustomer data safety is a critical risk factor and if yousuffer a risk incident, customers won’t discriminatebetween your company and its vendors – they’ll blameyou. That means your reputation and finances, notthose of your vendors, will bear the brunt of the damage.This includes immediate harms – including possibleloss of existing customers, contracts and partners,legal or regulatory penalties, increased insurancecosts and a hit to your reputation – as well as theopportunity cost of future harm, as customers maybe reluctant to trust you with their business (funds,data, relationships).For example, credit services company Equifax’s databreach, which has affected as many as 143 millioncustomers, “may cost the company hundreds ofmillions of dollars and hurt its reputation for years tocome,” according to CNBC.4 Similarly, the fallout – interms of reputational and financial losses – attendingother high-profile data breaches, such as thosesuffered by Home Depot (more than 179 million5),Sony ( 99 million in losses and a 10% drop in shareprice6) and Target (nearly 300 million7), has beenwell-documented.If your business shares information with third parties,it’s vital that your risk management encompasses theiractivities too. Verizon notes in its Data Breach Digestthat to manage and control risk, “you must first assess itaccurately,” and also highlights the importance of holding“complete knowledge of all information assets”.8This includes knowledge of where, how and howsecurely they’re holding your data. Only a vendor riskmanagement program can provide you with the properoversight into your extended vendor network’s risks.If a risk event does occur, Vendor Risk Managementplays a critical role. In such events, the crisiscommunication playbook is clear: transparency andimmediacy are paramount; customers, insurers,investors, regulators and legal bodies alike allwant to know what happened and how it’s beingremediated. Effective VRM processes will helpyou gather the information you need to identifythe problem and implement a solution. Andharms may be reduced if you can demonstratedue diligence in risk management, forexample by records like audit trails andcertifications, process maps and vendorcompliance reports.But VRM provides value even before riskevents occur. In part, this is due to therole it plays in reducing their likelihoodand severity. Customers and potentialpartners are themselves becomingmore risk-aware, and may want toknow about your organization’srisk profile before investingor transacting.Strategically Manage Vendor Risk and Build a Stronger Cybersecurity Posture

What does effective Vendor Risk Management look like?Many data breaches are due to companies thinkingthat being compliant is the same as being secure.While it’s true that the two are closely linked, taking aby-the-numbers approach to compliance won’t deliverthe best results. We recommend starting with securityand risk assessments, as many security frameworksand compliance frameworks have similar requirementsand controls. This should place your organization wellon the path to compliance.It should also mean that if further measures are neededto ensure full compliance with the standards relevantto your industry, then you should have a strong base onwhich to create them.For any organization that collaborates and shares datawith third parties, third-party vendor risk managementis an essential part of an effective security andcompliance regime. The key challengesit must meet include:4 Maintaining control over customer andemployee data Building confidence that third parties aretreating data securely (including verification) Ensuring your customers trust you withtheir data Ensuring you’re not lagging behind yourcompetitors on customer data security Managing vendors and keeping the right mix(out with the old, in with the new)WITH RISK COMES OPPORTUNITYAs with virtually any aspect of risk management,there is opportunity as well as hazard. Thinking ofrisk management as simply a matter of processand compliance loses sight of the ways in whicheffective risk management can generate competitiveadvantage. In particular, third-party risk managementcan help your business take full advantage ofthe benefits, while minimizing the downsides, ofan outsourced or aaS IT business model. Theseadvantages include: Reduced risk by creating a preferred vendor list Improved time to communicate with customers todemonstrate that you deserve their trust Enhanced competitiveness: With vendors – byestablishing minimum performance requirements With buyers – by displaying proof of yourimproved security posture (certifications, etc.)Organizations that take a proactive approach tothird-party vendor risk management should findthat these advantages translate into a more stableand profitable market presence. They should also,over time, experience the benefits of improvedcustomer trust and even customer advocacy. Thisis the foundation for any successful businessand is crucial to its ongoing success.

A Five Step Process for Creating a Balanced Portfolioof Security ProductsAdapted from Forbes, “How CISOs Can Create A Balanced Portfolio Of Cybersecurity Products”, March 20170504030201STAY AGILESELECTINNOVATIVETECHNOLOGYDESIGN YOURPORTFOLIOALLOCATESPENDING FOR RISKMANAGEMENTDETERMINENEEDSKeep track of changes to your business, to the treat landscape, and productinnovations and recenter as neededFind products that will deliver the needed capabilities for the best value andinsure they have an innovative road mapDetermine which capabilities will protect and defend what you already have in placeDecide how much you should allocate to each type of risk you may encounterstarting with technologies that hold sensitive data like PIITo look beyond perimeter defense, identify the types of attacks that are most likelyStrategically Manage Vendor Risk and Build a Stronger Cybersecurity Posture5

Picking the right VendorRisk Management solutionHow best, then, to implement strong a VRMautomation technology tool? First, it’s importantto implement a modern digital risk managementplatform. Old-school techniques, like usingcustomized spreadsheets, don’t offer the flexibilitythat’s needed, and they can’t automate importantprocesses like data gathering and analysis.There are numerous software platforms available,each with specific strengths and capabilities. Gartner9suggests that, absent of other company-specificrequirements, a good solution should include thesecapabilities and tools: Risk assessment process and workflows Collaboration Contract management Control assessment and monitoring Exception management History Access and user controls Remediation management Third-party content delivery Vendor performance management Vendor profile managementMany different vendor risk management solutions areavailable, featuring a range of capabilities, add-ons andindustry-specific functions. But a good supplier willoffer more than just a technology platform. You shouldlook for an organization that’s willing to become atrusted ally.A good supplier will help your organization planits vendor risk management implementation. Thisincludes: assessing your current situation; identifyingany gaps or weaknesses a malicious actor couldexploit; providing tools for evaluating your third-partysuppliers; and so on. It will also help with the rollout,not just in terms of the technology platform but alsowith messaging and training, and of course supplyongoing support, upgrades and advice.CUSTOMERS WON’T DISCRIMINATE BETWEENYOU AND YOUR VENDORS IF YOU SUFFER A RISKINCIDENT. THEY’LL BLAME YOU, AND IT’LL BEYOUR REPUTATION AND FINANCES THATTAKE THE HIT.ConclusionSuch a suite of risk, relationship and performancemanagement tools, in combination with the ability toprovide meaningful analytics and produce insightful,easy-to-understand reports and business intelligence,should enable you to manage your vendors andensure they’re managing your data – customer,financial, transactional and other – as carefully andsecurely as you are.6FINDING THE RIGHT SUPPLIERMany organizations simply don’t know how well theycan trust third-party vendors with their own customers’personal data unless they have a VRM program inplace. An effective third-party vendor managementimplementation will help you ally with reputablethird parties, verify their capabilities and move yourbusiness forward with a single, unified, accurateunderstanding of your risk posture “truth.”Strategically Manage Vendor Risk and Build a Stronger Cybersecurity Posture

123456789 wC, 2017, Strengthening digital society against cyber shocks: Key findings from The Global StatePof Information Security Survey 2018.PwC, CIO and CSO, 2017, The Global State of Information Security Survey 2018.IDC, 2017, Worldwide Semiannual Public Cloud Services Tracker.CNBC, 8 September 2017, ‘Equifax shares plunge the most in 18 years as Streetsays breach will cost company hundreds of millions’.Web Titan, 14 March 2017, ‘ Cost of a Retail Data Breach: 179 million for Home Depot’.Egnyte, 12 June 2017, ‘How Much Does a Data Breach Cost a Business?’. The SSL Store, Hashed Out, 26 May 2017, ‘Cost of 2013 Target Data Breach Nears 300 Million’. Verizon Enterprise, September 2017, "Data Breach Digest Update: Data ransomware – theCatch 22 Gartner, 2017, Magic Quadrant for IT Vendor Risk Management. Note that Gartner doesnot endorse any vendor, product or service depicted in its research publications, anddoes not advise technology users to select only those vendors with the highest ratingsor other designation. Gartner research publications consist of the opinions of Gartner’sresearch organization and should not be construed as statements of fact. Gartnerdisclaims all warranties, expressed or implied, with respect to this research, includingany warranties of merchantability or fitness for a particular purpose.REFERENCESVendor management r or-risk-management/Gartner magic quadrant[Supplied]Data ey.htmlEquifaxTargetSony: a-databreach-cost-a-business/Home Depot: ch179-million-home-depot/Strategically Manage and7

solutions to advance confidentlyAbout SAI GlobalSAI Global helps organizations proactivelymanage risk to create trust and achievebusiness excellence, growth, and sustainability.Our integrated risk management solutions area combination of leading capabilities, servicesand advisory offerings that operate across theentire risk lifecycle allowing businesses to focuselsewhere. Together, these tools and knowledgeenable clients to develop an integrated view of risk.To see our tools in action, request a free demo.We have global reach with locations across Europe, theMiddle East, Africa, the Americas, Asia and the Pacific.For more information visit www.saiglobal.com/SAI360.SAI Global ABN 67 050 611 642 2018 SAI Global.The SAI Global name and logo are trademarks of SAI Global.All Rights Reserved. 126053 1118

6 Egnyte, 12 June 2017, 'How Much Does a Data Breach Cost a Business?'. 7 The SSL Store, Hashed Out, 26 May 2017, 'Cost of 2013 Target Data Breach Nears 300 Million'. 8 Verizon Enterprise, September 2017, "Data Breach Digest Update: Data ransomware - the Catch 22 9 Gartner, 2017, Magic Quadrant for IT Vendor Risk Management.