Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Trustwave Unveils New Offerings to Maximize Value of Microsoft Security Investments. Learn More

Services
Capture
Managed Detection & Response

Eliminate active threats with 24/7 threat detection, investigation, and response.

twi-managed-portal-color
Co-Managed SOC (SIEM)

Maximize your SIEM investment, stop alert fatigue, and enhance your team with hybrid security operations support.

twi-briefcase-color-svg
Advisory & Diagnostics

Advance your cybersecurity program and get expert guidance where you need it most.

tw-laptop-data
Penetration Testing

Test your physical locations and IT infrastructure to shore up weaknesses before exploitation.

twi-database-color-svg
Database Security

Prevent unauthorized access and exceed compliance requirements.

twi-email-color-svg
Email Security

Stop email threats others miss and secure your organization against the #1 ransomware attack vector.

tw-officer
Digital Forensics & Incident Response

Prepare for the inevitable with 24/7 global breach response in-region and available on-site.

tw-network
Firewall & Technology Management

Mitigate risk of a cyberattack with 24/7 incident and health monitoring and the latest threat intelligence.

Solutions
BY TOPIC
Offensive Security
Solutions to maximize your security ROI
Microsoft Exchange Server Attacks
Stay protected against emerging threats
Rapidly Secure New Environments
Security for rapid response situations
Securing the Cloud
Safely navigate and stay protected
Securing the IoT Landscape
Test, monitor and secure network objects
Why Trustwave
About Us
Awards and Accolades
Trustwave SpiderLabs Team
Trustwave Fusion Security Operations Platform
Trustwave Security Colony
Partners
Technology Alliance Partners
Key alliances who align and support our ecosystem of security offerings
Trustwave PartnerOne Program
Join forces with Trustwave to protect against the most advance cybersecurity threats

Mitigating Third-Party Vendor Risk in Your Supply Chain

A recent survey by the analyst firm Gartner, showed that 89% of companies experienced a supplier risk event in the last five years; however, those companies' overall awareness and plans to mitigate lacked maturity. As a result, it is no longer enough to secure your own company's infrastructure. You must also evaluate the risk posed by third-party vendors and plan to monitor those organizations for breaches.

In today's interconnected world, an average auto manufacturer will have around 250 tier-one suppliers, which proliferates to 18,000 across the value chain. Key challenges lie in the time intensity, cost to maintain, no single source of truth, insufficient and obsolete controls, and a lack of visibility with third- and deeper-party relationships. 

Further issues arise around compliance to standards and regulations, such as NIST and the NIS Directive, ISO27001. While these standards are now more widely recognized and provide a common language to communicate, many third-party suppliers often do not adopt or use the frameworks. Thus, a level of baseline education is needed. 

There are many ways we can better prepare ourselves for these potential threats, moving towards a risk-based approach to provide a fast and quantitative way to achieve third-party assurance. 

The purpose of our work with clients using the Supply Chain Risk Diagnostic looks to increase the level of security awareness across an organization to better understand how we can reshape conversations regarding the supply chain. 

A few key lessons must be learned we navigate this ever-evolving landscape:

  1. Get the Basics Right– Organizations with good cyber hygiene and security basics prevent more attacks and find intrusions faster. It is imperative to have a baseline level of education of how one interacts with suppliers and build these security conscience behaviors into the company culture. 
  2. Move to a Risk-based Approach– A risk-based approach allows organizations to identify, prioritize, measure, and manage security controls in line with an enterprise risk management framework. This approach helps identify the top-tier high-risk suppliers and implement the necessary controls, moving away from a maturity-based approach, which has the potential pitfall of aspiring to a "monitor everything and everyone" mindset. 
  3. Ensure a Clear Governance Process for Procurement– Do you know who is accountable for what information and security controls? Unfortunately, this line often blurs with third parties and contractual agreements, as companies normally place more emphasis on reducing project costs and delivery times. Establishing a clear governance process allows both parties to put the necessary security controls in place. 

Trustwave's EMEA Cyber Advisory works with C-Suite and Executive Boards to develop a business-aligned security strategy and transformation programs. By taking a holistic approach that incorporates people, process, and technology, we bring cross-industry expertise to support business leaders and create a more cyber-resilient organization. For any questions, please contact Jessica.Charter@trustwave.com

Latest Trustwave Blogs

Comparably Honors Trustwave with Leadership and Career Growth Awards

Comparably, the leading workplace culture and compensation monitoring employee review platform has recognized Trustwave with two major awards: 2024 Best Companies for Career Growth and 2024 Best...

Read More

Why Removing Phishing Emails from Inboxes is Crucial for Healthcare Security

The adage "data is the new oil" doesn't resonate with everyone. Personally, having grown up around cars thanks to my dad, a master mechanic, I see oil as messy and cumbersome. Data, in my view, is...

Read More

How Deepfakes May Impact Upcoming Elections Worldwide

The common fear regarding election interference is that a threat actor will gain access to either ballot machines or the networks that tally votes. However, there is a much easier method a person...

Read More