InfoGuard AG (Headquarter)
Lindenstrasse 10
6340 Baar
Switzerland
InfoGuard AG
Stauffacherstrasse 141
3014 Bern
Switzerland
InfoGuard Deutschland GmbH
Landsberger Straße 302
80687 Munich
Germany
What do many of the hacks and data thefts in recent times have in common? The point of entry, which was successfully exploited by the attackers, was not the companies that were directly affected. In many cases, the security vulnerabilities emanated from suppliers, partners or other external service providers. Events such as these are not isolated cases; they are a common scenario when investigating successful attacks. Using illustrative examples, we will show you why supplier risk management must include IT security, an absolutely essential factor in the modern, effective management of cyber security risks, as well as which solutions can help you.
Several surveys (see e.g. Risk Management Monitor and Infosec Institute) conclude that at least 60% of recent IT security incidents were due to suppliers, partners or former employees. This figure demonstrates how important it is for you as a company to also be taking into account the IT security risks of your suppliers and service providers.
There are many challenges involved in evaluating suppliers, yet they present important reasons for dealing with supplier (security) risk management today:
As these four examples demonstrate, there are now many challenges facing companies. However, this subject's importance is a central issue, based on the experience gained and developments (increasing networking and dependency as well as the increasing maturity of attackers). Supplier risk management should not only include familiar aspects such as the reliability of deliveries, economic assessments, etc.; it should also cover IT security risks. If a hack or data theft is successful, this becomes the responsibility of your company - regardless of whether the attackers were able to access the systems and data directly via your IT or if it was via your supplier's data. This can result in high recovery costs, regulatory penalties and damage to your reputation that cannot be ignored.
Fortunately, today there are efficient tools that make this complex (but important) task of supplier risk management considerably easier for you. One of the leaders in this field is SecurityScorecard. The SecurityScorecard solution allows you to transparently and clearly understand the security risks of (potential) partners or service providers and then take the measures required. You can continuously monitor changes in your suppliers' scoring and manage the resulting risks. How does this work? SecurityScorecard scans externally available IPs and searches for additional information available online, such as attempted attacks or compromised company e-mail addresses, and clearly summarizes this information.
Having said that, SecurityScorecard does not only offer advantages in terms of pure supplier risk management. It also simplifies interface issues such as data protection and legal & compliance requirements. By the way - are the alarm bells still ringing when you hear the word "General Data Protection Regulation"? SecurityScorecard also provides you with helpful information on this subject by comparing the vulnerabilities that have been detected with the technical requirements (e.g. Privacy by Design, Privacy by Default) of the regulation. It is also possible to measure the deficiencies detected against international standards such as ISO 27001/2, NIST CSF or PCI DSS. Of course, you can also put your own company to the test by having it audited by SecurityScorecard. In turn, this can provide you with pointers for improving your own cyber security and your scoring with third parties.
Want to know more about SecurityScorecard? We will be happy to show you personally how you can use SecurityScorecard in your company - request a non-binding quote now!