Most enterprises are operationally dependent on a broad third-party ecosystem that must be equally resilient in the face of disruption.
No business is an island. While that has always been true, the digital transformation race has accelerated corporate interdependence at a faster rate than many organizations鈥� ability to manage the resulting third-party risk.
Often, companies don鈥檛 fully realize how interconnected they are until an IT outage or other disruption freezes their business operations. That鈥檚 when they fully appreciate the value of resilience and business continuity鈥攂ut, as with all risk management, it鈥檚 better to proactively plan, prepare, and stay ahead of potential disruptions.
Becoming a digital-first organization today requires sharing data on a near-constant basis throughout a complex and connected ecosystem of third-party companies that often have direct access to your business systems. Key processes are outsourced, regular software updates are made automatically, and edge computing models have decentralized computer architecture to such a degree that it is challenging to keep track of, let alone secure, critical data.
This data fluidity between third, fourth, and fifth parties is efficient and necessary, but it means that your critical processes may be in another company鈥檚 hands while multiplying opportunities for systems and data to be compromised. Your security is only as strong as the weakest link in your broader ecosystem of partners, vendors, suppliers, cloud providers, SaaS companies, internet of things (IoT) device manufacturers, and other relationships.
This third-party risk doesn鈥檛 suggest abandoning 鈥渁s a service鈥� solutions鈥攊n fact, we鈥檙e seeing companies pushing harder than ever into software as a service, platform as a service, and infrastructure as a service to lower their overhead鈥攂ut it does strongly argue for a parallel need to invest in resilience.
With cloud and digital technologies creating hyperconnected, multi-partner ecosystems, there鈥檚 new willingness to proactively address the associated risk. Automation will continue to play an important role in activating appropriate corrective measures in these environments across third, fourth, and fifth parties.
Kyle Kappel
Cyber Security Leader, 乐鱼(Leyu)体育官网 US
Building resilience is a multi-pronged process. Regulatory standards such as executive orders in the US on supply chains or the EU鈥檚 Digital Operational Resilience Act (DORA) can help. Clear security obligations across all participants in these complex ecosystem structures can help. Vetting all potential vendors鈥� resilience policies at the contract negotiation stage, as well as the resilience built into all accessible products and services, can help. And making better use of resilience-ratings companies to supplement point-in-time assessments can help.
Specifically, businesses need to intensify their scrutiny of third-party vendor practices and integrate resilience into day-to-day operations:
Many companies are looking at machine-readable assessment formats, which help organizations think about third-party risk assessment as part of continuous controls-monitoring. The mindset here is no longer just compliance-based, it鈥檚 now primarily operations-based. Existing third-party risk programs in virtually every industry largely aren鈥檛 prepared for this transition.
Marcus Murph
Principal, CIO Advisory, 乐鱼(Leyu)体育官网 US
While prevention is the primary goal, the complexity, decentralization, and interdependence of today鈥檚 business ecosystems suggests that some percentage of these situations is inevitable. An open network is inherently a vulnerable network and there will always remain some risks that can鈥檛 be anticipated, or the diligence required to manage others may simply be too time-consuming and costly to make business sense.
For those marginal cases, organizations need to focus on business continuity plans that help limit the impact, maintain business operational capabilities, preserve customer trust, recover quickly, and reduce the effects of future incidents. The key goal is sustaining essential functional and core revenue-generating business processes during an incident.
Where resilience is strategic, focusing on the ability to adapt to and weather disruptive incidents, business continuity highlights the processes and procedures an organization follows to maintain operations during an incident when multiple business areas and tangential stakeholders may be in panic mode. That includes determining which business processes truly are mission critical and understanding how they function vis-脿-vis your network, testing recovery processes to verify that value chains can be quickly restarted following a disruption, investing in redundancy, enhancing transparency, and preparing coordinated response plans.
Recent events have highlighted the degree to which companies in today鈥檚 digital economy are linked. When a key supplier sneezes, your entire network catches a cold. Every company working within this environment needs rigorous resilience and business continuity plans. But, just as importantly, those plans need to be deployed throughout your entire network.
At 乐鱼(Leyu)体育官网, we understand connections and have experience across the continuum鈥攆rom the boardroom to the data center鈥攖o help you identify sources of risk across business relationships. Our approach is holistic, continuous, and heavily invested in next-generation technology that not only helps us remain a step ahead of threats but also integrates resilience and business continuity throughout the business lifecycle. Because, in a hyperconnected business world, we all have a responsibility to protect our partnership ecosystem.
Navigating the fallout: Lessons from the Crowdstrike outage
Plus 7 key backup and recovery actions
Make operational resilience your North Star
In a fluid, often uncertain environment, organizations should cultivate a culture of resilience, embedding robust contingency plans that encompass not just IT infrastructure but also key business operations.
Be organizationally and operationally resilient when 鈥� and where 鈥� it matters
During an IT outage, cyber-attack, or any significant functional disruption, organizations must focus on restoring critical operations in minutes and hours, not days and weeks.
Turn insight into opportunity with unique perspectives and actionable insights addressing the burning issues atop the C-suite agenda. Delivered monthly.
Our professionals bring a combination of technological expertise, deep business knowledge, creativity, and a passion to protect and progress your business.