Organisations have developed risk-based assessment methods and tools to ensure that third-party suppliers and partners are regularly assessed to guarantee compliance with required security standards. Some organisations are also using external service providers to carry out periodic assessments of partners and vendors.
Our conversations with industry
In the first half of 2022 ASIC met with industry and professional associations to understand how participants identified, managed and mitigated cybersecurity risk with their suppliers.
It was clear that supply chain cyber risk is complex and difficult to manage. Organisations need to be able to define their risk appetite and identify risks relevant to their business. This is critical to ensuring an organisation’s ability to put in place risk management mitigants appropriate to the nature, scale and complexity to their business.
Five common themes were identified. Organisations should consider these themes in their risk management frameworks:
1. Finding your weakest link isn’t always easy
Most organisations were aware they were only as strong as the weakest link in their supply chain. However, they often faced difficulty obtaining visibility into their suppliers' operations.
Many organisations used contract terms to help increase transparency and mitigate fourth-party risk, for example, by requiring suppliers to notify the organisation if their subcontractors or vendors experienced a cyber security event.
However, in some cases, organisations felt they had limited bargaining power, for example, when negotiating contracts with larger, established third-party suppliers. This was common in sectors where there was reliance on a small number of vendors.
2. Innovation and cyber security can coexist
For most organisations, cyber security did not mean sacrificing innovation. Instead, it highlighted the need for robust vendor risk management practices. For example, organisations were able to effectively leverage innovation when they:
- Viewed cyber risk through an enterprise lens, for example, by outsourcing in accordance with established risk appetite statements.
- Conducted periodic risk-based testing of the cyber security of their suppliers, for example, scenario testing and risk-based vendor assessment and testing.
3. People matter
Many organisations recognised their people were their greatest defence against cyber risk in the supply chain. For example:
- organisations that fostered close collaborative relationships with their suppliers rather than relying on contract terms obtained more timely threat intelligence
- organisations that sought to empower staff to actively consider cyber risk (e.g. through training and awareness or integration of cyber expertise in the business) helped minimise exposure to cyber threats.
4. We need to speak the same language
Management of cyber security risk is not just the domain of the IT department or a supplier of IT services.
Organisations that tackled the initial 'barrier of ignorance' and made cyber literacy a priority were better placed to identify, manage, and mitigate cyber risk in the supply chain.
5. The right information at the right time
A key concern for decision-makers was that they were not getting the right information at the right time to make informed decisions.
Many decision-makers were actively seeking opportunities to uplift their own capabilities. However, reports were often too complex or jargon-heavy, making it hard for decision-makers to understand the cyber risks facing the organisation.
We heard that:
- having an independent audit or assessment of their organisations' cyber resilience helped them make informed risk decisions
- having board members and/or senior management with information technology competency changes the nature of the conversations around cyber security.