Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Trending

Elon Musk’s Last-Ditch Effort to Control OpenAI: Recruit Sam Altman to Tesla

May 12, 2026

‘Big News’—Google Changes Android Messages After 12 Years

May 12, 2026

Using AI for Just 10 Minutes Might Make You Lazy and Dumb, Study Shows

May 11, 2026
Facebook Twitter Instagram
  • Newsletter
  • Submit Articles
  • Privacy
  • Advertise
  • Contact
Facebook Twitter Instagram
Startup DreamersStartup Dreamers
  • Home
  • Startup
  • Money & Finance
  • Starting a Business
    • Branding
    • Business Ideas
    • Business Models
    • Business Plans
    • Fundraising
  • Growing a Business
  • More
    • Innovation
    • Leadership
Subscribe for Alerts
Startup DreamersStartup Dreamers
Home » Do You Have Blind Faith In Your External Partners?
Innovation

Do You Have Blind Faith In Your External Partners?

adminBy adminAugust 21, 20230 ViewsNo Comments4 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

Christine Halvorsen is a Managing Director at Protiviti dedicated to helping organizations in a world of emerging and changing risks.

Cybercriminals are finding success exploiting vulnerabilities in outsourcing arrangements due in large part to the “blind faith” complacency with which many businesses manage third-party vendor relationships. As guardians of their enterprises, business leaders should ask themselves this critical question when considering a third-party vendor arrangement: Is our organization entering into the relationship with blind faith?

Consider, for example, the rise of cloud technology and services, which has resulted in a boom in as-a-service offerings, artificial intelligence (AI) and machine learning (ML) and the Internet of Things (IoT), among other emerging technologies. Companies are implementing these new technologies at an incredibly fast pace to be competitive, potentially affecting security in the process.

It’s this blind faith in giving more third-party vendors privileged access to systems and data without appropriate checks that can introduce vulnerabilities and risks to the organization. The supply chain cyberattack on MOVEit, allegedly by the Russian-linked Clop criminal ransomware group, is a notable example and a sure sign that companies need to step up their security and resilience efforts. The attack exploited a vulnerability within the MOVEit services that allegedly allowed Clop to gain access to their customers through a vulnerability that was unknown to the organization.

The initial damage assessment of the attack uncovered victims from more than 200 organizations, with at least 33 data breach disclosures resulting in more than 17.5 million affected individuals. This significant impact was caused by a vulnerability in a file transfer service that was part of a spider web of interconnectivity between the service provider and its customers. Attacks like this should have every business leader asking: “Has our organization identified, assessed and mitigated the risks our intricate external partner network presents to our organization?”

Instead of operating with blind faith, organizations should create a circle of trust through established due diligence frameworks and processes. They can begin this journey of creating a circle of trust by taking these five critical steps.

1. Correlate all external partners and the services they provide to the organization. This exercise would help:

• Identify assets and services within the organization delivered through external partners.

• Identify threats, vulnerabilities and consequences of those external partners.

• Determine the risk tolerance and tradeoffs related to the protection of those assets and services.

• Implement a continuous monitoring program.

2. Establish a cyber supply chain risk management (CSCRM) framework. This process involves:

• Conducting a SCRM assessment.

• Documenting assessment results, clarifying findings and incorporating lessons learned into the SCRM policies and processes.

• Establishing mitigation actions.

• Identifying all stakeholders and individual responsible owners (hub and spoke).

3. Perform comprehensive due diligence on suppliers of products, services, materials and contractual agreements. This process entails:

• Conducting research and due diligence on suppliers’ risk on a continuous basis to include the sanctions, cyber, financial, reputational, foreign ownership control or influence (FOCI), operational and overall risk scores.

• Building an understanding of suppliers’ risk.

• Conducting a service level agreement (SLA) and/or contractual audit.

• Aligning suppliers with cyber vulnerabilities.

4. Develop and implement an asset management system for software and hardware. You can do this by:

• Establishing a software bill of materials (SBOM) to create a comprehensive inventory of the components used to make up a piece of software.

• Establishing a hardware bill of materials (HBOM) to create a comprehensive inventory of the components used within your infrastructure.

5. Deploy a mitigation strategy to manage risk. This is critical to:

• Determine the breadth and depth of the threat and vulnerability.

• Establish risk posture.

• Establish approval and escalation procedures.

• Develop and deploy a training program.

• Automate mitigation processes where applicable.

Here’s the bottom line—and it can’t be overstated: Organizations that haven’t itemized and reconciled their third-party relationships against consistent risk criteria, business-critical processes and applications are vulnerable to a broader range of vulnerabilities and misadventures.

Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?

Read the full article here

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Articles

‘Big News’—Google Changes Android Messages After 12 Years

Innovation May 12, 2026

Google And Microsoft Warn Passkeys May Not Stop Hackers

Innovation May 11, 2026

Bonus Winners, Highlights And Analysis

Innovation May 10, 2026

Dana White ‘Finalizing’ Massive Shakur Stevenson Deal

Innovation May 9, 2026

Date, Location, Time, How To Watch

Innovation May 8, 2026

What Are Peptides And Why Is Everyone Talking About Them?

Innovation April 29, 2026
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Elon Musk’s Last-Ditch Effort to Control OpenAI: Recruit Sam Altman to Tesla

May 12, 2026

‘Big News’—Google Changes Android Messages After 12 Years

May 12, 2026

Using AI for Just 10 Minutes Might Make You Lazy and Dumb, Study Shows

May 11, 2026

Google And Microsoft Warn Passkeys May Not Stop Hackers

May 11, 2026

Bonus Winners, Highlights And Analysis

May 10, 2026

Latest Posts

Dana White ‘Finalizing’ Massive Shakur Stevenson Deal

May 9, 2026

US Special Forces Soldier Arrested for Polymarket Bets on Maduro Raid

May 8, 2026

Date, Location, Time, How To Watch

May 8, 2026

This Indigenous Language Survived Russian Occupation. Can It Survive YouTube?

May 7, 2026

Good Luck Getting a Mac Mini for the Next ‘Several Months’

May 6, 2026
Advertisement
Demo

Startup Dreamers is your one-stop website for the latest news and updates about how to start a business, follow us now to get the news that matters to you.

Facebook Twitter Instagram Pinterest YouTube
Sections
  • Growing a Business
  • Innovation
  • Leadership
  • Money & Finance
  • Starting a Business
Trending Topics
  • Branding
  • Business Ideas
  • Business Models
  • Business Plans
  • Fundraising

Subscribe to Updates

Get the latest business and startup news and updates directly to your inbox.

© 2026 Startup Dreamers. All Rights Reserved.
  • Privacy Policy
  • Terms of use
  • Press Release
  • Advertise
  • Contact

Type above and press Enter to search. Press Esc to cancel.

GET $5000 NO CREDIT