Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Jeffrey Epstein Advised an Elon Musk Associate on Taking Tesla Private

February 14, 2026

AI Industry Rivals Are Teaming Up on a Startup Accelerator

February 13, 2026

‘Uncanny Valley’: Tech Elites in the Epstein Files, Musk’s Mega Merger, and a Crypto Scam Compound

February 11, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » Do You Have Blind Faith In Your External Partners?
Innovation

Do You Have Blind Faith In Your External Partners?

adminBy adminAugust 21, 20230 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Christine Halvorsen is a Managing Director at Protiviti dedicated to helping organizations in a world of emerging and changing risks.

Cybercriminals are finding success exploiting vulnerabilities in outsourcing arrangements due in large part to the “blind faith” complacency with which many businesses manage third-party vendor relationships. As guardians of their enterprises, business leaders should ask themselves this critical question when considering a third-party vendor arrangement: Is our organization entering into the relationship with blind faith?

Consider, for example, the rise of cloud technology and services, which has resulted in a boom in as-a-service offerings, artificial intelligence (AI) and machine learning (ML) and the Internet of Things (IoT), among other emerging technologies. Companies are implementing these new technologies at an incredibly fast pace to be competitive, potentially affecting security in the process.

It’s this blind faith in giving more third-party vendors privileged access to systems and data without appropriate checks that can introduce vulnerabilities and risks to the organization. The supply chain cyberattack on MOVEit, allegedly by the Russian-linked Clop criminal ransomware group, is a notable example and a sure sign that companies need to step up their security and resilience efforts. The attack exploited a vulnerability within the MOVEit services that allegedly allowed Clop to gain access to their customers through a vulnerability that was unknown to the organization.

The initial damage assessment of the attack uncovered victims from more than 200 organizations, with at least 33 data breach disclosures resulting in more than 17.5 million affected individuals. This significant impact was caused by a vulnerability in a file transfer service that was part of a spider web of interconnectivity between the service provider and its customers. Attacks like this should have every business leader asking: “Has our organization identified, assessed and mitigated the risks our intricate external partner network presents to our organization?”

Instead of operating with blind faith, organizations should create a circle of trust through established due diligence frameworks and processes. They can begin this journey of creating a circle of trust by taking these five critical steps.

1. Correlate all external partners and the services they provide to the organization. This exercise would help:

• Identify assets and services within the organization delivered through external partners.

• Identify threats, vulnerabilities and consequences of those external partners.

• Determine the risk tolerance and tradeoffs related to the protection of those assets and services.

• Implement a continuous monitoring program.

2. Establish a cyber supply chain risk management (CSCRM) framework. This process involves:

• Conducting a SCRM assessment.

• Documenting assessment results, clarifying findings and incorporating lessons learned into the SCRM policies and processes.

• Establishing mitigation actions.

• Identifying all stakeholders and individual responsible owners (hub and spoke).

3. Perform comprehensive due diligence on suppliers of products, services, materials and contractual agreements. This process entails:

• Conducting research and due diligence on suppliers’ risk on a continuous basis to include the sanctions, cyber, financial, reputational, foreign ownership control or influence (FOCI), operational and overall risk scores.

• Building an understanding of suppliers’ risk.

• Conducting a service level agreement (SLA) and/or contractual audit.

• Aligning suppliers with cyber vulnerabilities.

4. Develop and implement an asset management system for software and hardware. You can do this by:

• Establishing a software bill of materials (SBOM) to create a comprehensive inventory of the components used to make up a piece of software.

• Establishing a hardware bill of materials (HBOM) to create a comprehensive inventory of the components used within your infrastructure.

5. Deploy a mitigation strategy to manage risk. This is critical to:

• Determine the breadth and depth of the threat and vulnerability.

• Establish risk posture.

• Establish approval and escalation procedures.

• Develop and deploy a training program.

• Automate mitigation processes where applicable.

Here’s the bottom line—and it can’t be overstated: Organizations that haven’t itemized and reconciled their third-party relationships against consistent risk criteria, business-critical processes and applications are vulnerable to a broader range of vulnerabilities and misadventures.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

Today’s Wordle #1686 Hints And Answer For Friday, January 30

Innovation January 30, 2026

Today’s Wordle #1685 Hints And Answer For Thursday, January 29

Innovation January 29, 2026

Today’s Wordle #1684 Hints And Answer For Wednesday, January 28

Innovation January 28, 2026

U.S. Revamps Wildfire Response Into Modern Central Organization

Innovation January 27, 2026

Studies Are Increasingly Finding High Blood Sugar May Be Associated With Dementia

Innovation January 26, 2026

Google’s Last Minute Offer For Pixel Customers

Innovation January 25, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Jeffrey Epstein Advised an Elon Musk Associate on Taking Tesla Private

February 14, 2026

AI Industry Rivals Are Teaming Up on a Startup Accelerator

February 13, 2026

‘Uncanny Valley’: Tech Elites in the Epstein Files, Musk’s Mega Merger, and a Crypto Scam Compound

February 11, 2026

How iPhones Made a Surprising Comeback in China

February 10, 2026

Loyalty Is Dead in Silicon Valley

February 9, 2026

Latest Posts

The Tech Elites in the Epstein Files

February 6, 2026

Elon Musk Is Rolling xAI Into SpaceX—Creating the World’s Most Valuable Private Company

February 5, 2026

TikTok Data Center Outage Triggers Trust Crisis for New US Owners

February 3, 2026

No Phone, No Social Safety Net: Welcome to the ‘Offline Club’

February 2, 2026

Moltbot Is Taking Over Silicon Valley

February 1, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT