A Single Partner for Everything You Need Optiv works with more than 450 world-class security technology partners. By putting you at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We Are Optiv Greatness is every team working toward a common goal. Winning in spite of cyber threats and overcoming challenges in spite of them. It’s building for a future that only you can create or simply coming home in time for dinner. However you define greatness, Optiv is in your corner. We manage cyber risk so you can secure your full potential.
Third-Party Breaches Will Continue Until Morale Improves Breadcrumb Home Insights Blog Third-Party Breaches Will Continue Until Morale Improves November 09, 2017 Third-Party Breaches Will Continue Until Morale Improves I have some bad news for you: breaches at third parties are not going to stop – not any time soon. Various studies show that somewhere between one-third and two-thirds of all breaches have their nexus in third-party service providers. Given the decade-long outsourcing trend that is not showing any signs of slowing down, this means that your organization has a decent chance of experiencing one directly or through one of your third parties. We have spoken at length in previous blog posts about proactive measures your organizations can take. Mainly, you can conduct risk assessments on your critical third parties to better understand which third parties might warrant extra attention in the form of improved security controls and other means. However, in this blog, I’m discussing some of the reasons why third-party breaches occur. High Concentration of Information The infamous bank robber Willie Sutton was once asked why he robbed banks. “Because that’s where the money is,” was his reply. When any criminal is developing a plan to steal wealth, it makes sense to target locations where high concentrations of wealth reside. In many cases, that means third-party service providers, particularly those that store data of value. Data Segregation Problems Most software-as-a-service (SaaS) providers’ applications are multi-tenant. This means that data for many (and often, all) customers resides in a single database. SaaS providers implement a number of logical controls to ensure that data from one customer is not accessible to any other customer. Building these logical data segregation controls is not easy. These controls can be rather complex, and many security professionals understand the phrase, “complexity is the enemy of security,” meaning that a complex system can be difficult to secure, and it can be difficult to maintain that security over time. Mission and Loyalty Conflict Third-party service providers are organizations separate from your own. They have their own mission, culture and values. Their loyalty is different too. As much as they will say that they are client-focused, customer-focused or that customers come first, we all know that the implicit mission of any organization is its survival and growth. This means that the organizations that store your sensitive and critical information are first loyal to their own organizations. Any residual loyalty will be towards their customers. Measuring trustworthiness is subjective and not straightforward. The best that one can do is obtain some customer references to see how well they execute on their customer loyalty and service, then monitor the relationship for changes. Younger and Smaller Companies with Immature Programs and Controls Some of the SaaS applications used today are developed and operated by relatively small and young organizations. Others are part of a trusted major firm’s portfolio, but came to being as acquisitions of smaller organizations. Key stakeholders in any organization’s third-party risk program need to be familiar with their third-party vendor portfolio, including knowledge of each vendor’s financial health and origins, as well as the effectiveness of their controls. As many security professionals can attest, younger and smaller organizations tend to have immature security programs with very limited capabilities. Cyber criminals know this as well, and exploit weaknesses in smaller service providers’ weaker defenses. Many of these smaller service providers also have limited means for knowing when a breach has occurred, as well as limited incident response capabilities. Many lack central logging and 24/7 monitoring, and their staff may have limited experience with security incident response. These factors make it especially important for security managers to conduct detailed due diligence on their SaaS providers, including detailed questionnaires on their IT controls, as well as validation of the most important controls. The steps to an effective third-party management program are: Identify all of your third parties Establish risk ranking criteria Risk rank your third parties according to that criteria Develop due diligence procedures for third parties at each level of risk (for instance, highest risk third parties might receive lengthy questionnaires annually, medium risk third parties would be issued shorter questionnaires every year or two, and lowest risk third parties might be vetted up front with a short questionnaire) These are just the first steps, and there’s a lot more detail involved in building out a comprehensive third-party risk management program. (Related note: With IoT devices, a vendor should be committed to baking-in security, and maintaining a product after release. It should be a concern if a vendor tends to never patch or update their legacy portfolio. Security is essential in each vendor’s software development life cycle (SDLC).) By: Peter Gregory Director, Information Security Peter Gregory is a director in Optiv's Office of the CISO. He is a leading security technologist and strategist with a long professional history of advancing security technology, compliance and risk management at all levels of corporate culture. He has published more than 40 books and authored more than 30 articles for leading trade publications in print and online. Share: Third-Party Risk Risk
Would you like to speak to an advisor? How can we help you today? Image E-Book Cybersecurity Field Guide #13: A Practical Approach to Securing Your Cloud Transformation Download Now Image Events Register for an Upcoming OptivCon Learn More Ready to speak to an Optiv expert to discuss your security needs?