top of page

Close Encounters of the Third Kind

Updated: Apr 11, 2022

Your closest supplier can become your biggest problem. Overnight. Are you prepared?

Most organizations are not prepared for a 3rd party (supply-chain) cyber attack, and in today's' hyper-integrated economy, it means ignoring a significant business risk. And those risks have never been higher.

Why? Because it makes sense for the attackers.

Why waste efforts trying to hack a well-protected enterprise when you can quickly go through one of its suppliers. It also scales! The attackers gain access to multiple organizations through a single attack.

So don't wait for that 3 AM call from one of your suppliers telling them they have been hacked. Plan for it.

* Gain visibility to who your suppliers are. Some suppliers are obvious; some are not.

* Assess existing suppliers and new suppliers' cybersecurity posture and simulate your business impact, assuming they are breached.

* Educate your ecosystem on the importance of elevating their posture and demand thresholds to be met as part of doing business together.

* Facilitate a process that allows you to learn about incidents on your vendors' side as quickly as possible.

* Document suppliers' efforts to assess progress and compliance over time.

* Constantly monitor the landscape. Periodically is not enough.


Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page