HomeCII/OTMitigating Risk through Threat Intelligence

Mitigating Risk through Threat Intelligence

Published on

spot_img

The significance of third-party cybersecurity risks in the realm of enterprise risk has grown significantly in recent years. To combat this issue, organizations have been urged to implement effective third-party risk management programs in order to not only mitigate their risks but also to enhance their protection against attacks that originate from third parties. The key factor here is the effectiveness of these programs.

A recently released e-zine from Dark Reading, titled “How to Use Threat Intelligence to Mitigate Third-Party Risk,” explores the implementation of threat intelligence to establish a continuous risk assessment of partners, suppliers, vendors, contractors, and other third parties. By utilizing third-party threat intelligence, security teams can move beyond the conventional point-in-time view of security and regulatory compliance maturity, and instead, accurately evaluate the risks over time. This convergence of threat intelligence and third-party risk management (TPRM) programs serves as an assurance that third parties do not pose a high risk of data breaches or other cybersecurity incidents. Furthermore, in the unfortunate event of such an incident occurring, these programs can also help to minimize the impact.

In the past, TPRM programs, if they were in place at all, typically involved identifying, categorizing, and assessing the risk associated with third parties. This was often accompanied by the use of due-diligence questionnaires, which were designed to gauge the level of maturity of their security and regulatory compliance programs. Additionally, enterprises would conduct thorough independent investigations of vendors before finalizing any contracts. Lastly, organizations would incorporate new partners and suppliers into their incident response planning to minimize the impact of any potential incidents.

Alla Valente, the senior research analyst at Forrester who covers governance, risk, and compliance, as well as third-party risk and supply chain risk, highlights the limitations of relying solely on questionnaires. She emphasizes that while questionnaires may provide some insights into a company’s policies and certifications, they do not reveal crucial information about the internal workings of their networks or systems. Moreover, they fail to address broader risks, such as geographic considerations or potential targeting by nation-states. Valente stresses the importance of uncovering these factors, stating, “These are all things you want to identify.”

Although there is limited data available on how enterprises utilize TPRM threat intelligence to enhance their third-party risk management, TPRM programs are gaining momentum across the board. According to Prevalent’s 2022 Third-Party Risk Management Industry Study, two-thirds of the respondents noted that their TPRM programs have garnered increased visibility among executives and the board compared to the previous year.

To gain insights into reducing third-party risks for their organizations through the utilization of threat intelligence, readers are encouraged to refer to Dark Reading’s “How to Use Threat Intelligence to Mitigate Third-Party Risk.”

In conclusion, as third-party cybersecurity risks continue to evolve and pose significant threats to organizations, effective third-party risk management programs have become crucial. By incorporating threat intelligence into these programs, organizations can gain a comprehensive understanding of the risks associated with their third-party relationships and take proactive measures to mitigate them. As TPRM programs gain traction, there is a growing recognition of their importance among executives and the board. Ultimately, leveraging threat intelligence becomes an essential strategy in safeguarding organizations against the detrimental consequences of third-party cyber attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...