New services can help enterprises assess and mitigate risk in the cyber supply chain Ask any CISO what their job entails and they are likely to respond with a common mantra: Assess IT risk, communicate IT risk to business executives, and then create and execute a mutually agreed upon plan to address risk. In the past, CISOs concentrated this effort on internal IT but this internal focus is becoming increasingly myopic because:1. Outsiders have network access. Enterprises regularly grant network access to business partners, suppliers, and customers. 2. “Shadow” IT is on the rise. Employees, functional departments, and business units are eschewing homegrown apps for SaaS offerings while IT moves internal systems to cloud-based infrastructure. 3. Multi-site Web-facing applications are extremely vulnerable. This problem goes beyond application vulnerabilities and SQL injection attacks. If you host an ad network on your site (or your linked business partners host an ad network on their site) you will likely have a “weak link” somewhere in the chain.In aggregate, these issues are part of a greater problem – cyber supply chain security. To be clear, the term cyber supply chain security encompasses any organization or person that supplies, uses, or connects to your organization’s IT systems, networks, services, and applications. This includes hardware/software suppliers, VARs, business partners, contractors, etc. In this context, the cyber supply chain has a profound impact on risk management. CISOs really need to assess risks associated with every aspect of the cyber supply chain and not just those they can actually touch within their networks. Obviously, this makes risk management a lot harder and we haven’t found a good solution yet. Many CISOs address cyber supply chain risk with annual IT security “audits” of selected partners. These “audits” usually are based upon some written checklist that some but not all partners are asked to respond to on an annual basis. It’s pretty easy to see the fatal flaws here. Audits are conducted on select partners while some or even most 3rd parties with network access get a free pass. SaaS and cloud providers may or may not be included. Finally, “audits” are done annually so there is no visibility into real-time risk as things constantly change. Clearly this model isn’t right so what can be done? CISOs should simply emulate what they are doing internally – continuous monitoring of their internal networks so they can assess and address new risks as they arise. In fact, DHS extended continuous monitoring with a program called Continuous Diagnostics and Mitigation (CDM) that extends to risk alleviation. What’s more, the GSA has negotiated Blanket Purchase Agreements (BPAs) with 17 firms including Booz Allen Hamilton, CSC, IBM, Lockheed-Martin, and Northrop-Grumman to supply CDM professional and managed services. Obviously, the feds think there is great value here. So what’s really needed is outside-in continuous monitoring of the cyber supply chain. A number of savvy entrepreneurs and VCs with deep pockets recognize this opportunity and are funding innovative SaaS providers to bridge the gap. For example, BitSight provides an intriguing rating service (along the lines of a credit score or D&B) that looks at cyber risk across companies and industries. RiskIQ provides outside-in continuous monitoring of ad networks looking for hidden malware and spyware, and SkyHigh Networks constantly assesses risks associated with consumer and enterprise cloud services. Cyber adversaries know that our networks are dynamically connected with others so finding the “weakest link in the cybersecurity chain” could be as easy as hacking into your HVAC contractor’s systems – just ask Target. We need better oversight and visibility over cyber supply chain risk and we need it as soon as possible. Given this, it’s likely that these VC-backed startups are in the right place at the right time. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe