Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Trustwave SpiderLabs Uncovers Unique Cybersecurity Risks in Today's Tech Landscape. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Mitigating Third-Party Vendor Risk in Your Supply Chain

A recent survey by the analyst firm Gartner, showed that 89% of companies experienced a supplier risk event in the last five years; however, those companies' overall awareness and plans to mitigate lacked maturity. As a result, it is no longer enough to secure your own company's infrastructure. You must also evaluate the risk posed by third-party vendors and plan to monitor those organizations for breaches.

In today's interconnected world, an average auto manufacturer will have around 250 tier-one suppliers, which proliferates to 18,000 across the value chain. Key challenges lie in the time intensity, cost to maintain, no single source of truth, insufficient and obsolete controls, and a lack of visibility with third- and deeper-party relationships. 

Further issues arise around compliance to standards and regulations, such as NIST and the NIS Directive, ISO27001. While these standards are now more widely recognized and provide a common language to communicate, many third-party suppliers often do not adopt or use the frameworks. Thus, a level of baseline education is needed. 

There are many ways we can better prepare ourselves for these potential threats, moving towards a risk-based approach to provide a fast and quantitative way to achieve third-party assurance. 

The purpose of our work with clients using the Supply Chain Risk Diagnostic looks to increase the level of security awareness across an organization to better understand how we can reshape conversations regarding the supply chain. 

A few key lessons must be learned we navigate this ever-evolving landscape:

  1. Get the Basics Right– Organizations with good cyber hygiene and security basics prevent more attacks and find intrusions faster. It is imperative to have a baseline level of education of how one interacts with suppliers and build these security conscience behaviors into the company culture. 
  2. Move to a Risk-based Approach– A risk-based approach allows organizations to identify, prioritize, measure, and manage security controls in line with an enterprise risk management framework. This approach helps identify the top-tier high-risk suppliers and implement the necessary controls, moving away from a maturity-based approach, which has the potential pitfall of aspiring to a "monitor everything and everyone" mindset. 
  3. Ensure a Clear Governance Process for Procurement– Do you know who is accountable for what information and security controls? Unfortunately, this line often blurs with third parties and contractual agreements, as companies normally place more emphasis on reducing project costs and delivery times. Establishing a clear governance process allows both parties to put the necessary security controls in place. 

Trustwave's EMEA Cyber Advisory works with C-Suite and Executive Boards to develop a business-aligned security strategy and transformation programs. By taking a holistic approach that incorporates people, process, and technology, we bring cross-industry expertise to support business leaders and create a more cyber-resilient organization. For any questions, please contact Jessica.Charter@trustwave.com

Latest Trustwave Blogs

Trustwave MailMarshal Unveils Major Upgrades to Combat New Email Security Threats

Trustwave MailMarshal will receive a massive upgrade on March 28 that will add four new levels of functionality, including an improved dashboard interface, the ability to detect and halt malicious QR...

Read More

Unveiling the Latest Ransomware Threats Targeting the Casino and Entertainment Industry

Anyone who has visited a casino knows these organizations go to a great deal of expense and physical effort to ensure their patrons do not cheat. Still, there is a large group of actors who are...

Read More

Third-Party Risk: How MDR Offers Relief as Security Threats Abound

While third-party products and services are crucial to everyday business operations for almost any company, they also present significant security concerns, as high-profile attacks including...

Read More