Page 264 - Cyber Defense eMagazine August 2024
P. 264

Notably, many companies don’t utilize this method. In one recent survey of over 2,500 companies,  29%
            of senior executives reportedly don’t assign a risk score to each vendor. An additional 13% admitted they
            don’t use any third-party risk management system, highlighting the opportunity for widespread adoption.

            Decision-makers  should look to guidance  like the International  Organization  for Standardization  28000
            to learn how to reduce security risks or the National Institute for Standards and Technology SP 800-161
            to manage supply chain threats. These standards can help them recognize what to prioritize and how to
            proceed.



            Best Practices for Handling Third-Party Insider Threats

            A zero-trust  architecture  is quickly becoming fundamental  to cybersecurity.  Leveraging  it can minimize
            companies’  insider threat risk and reduce the scope of potential  damage. Giving supply chain vendors
            the minimum amount of access needed to do their jobs prevents them from having opportunities to cause
            problems.

            Another best practice is to leverage encryption. While typical techniques minimize the damage negligent
            and  inadvertent  insiders  can  do,  format-preserving  encryption  (FPE)  prevents  malicious  actions.  Its
            ciphertext is the same form and length as the plaintext, allowing vendors to perform operations on data
            without reading it or possessing a decryption key.


            Decision-makers  should  also  consider  developing  an  incident  response  strategy  to  address  internal
            threats as soon as the IT team detects  them, minimizing  the scope  of damage.  Outlining  the grounds,
            limitations  and  implications  of  such  action  in  contracts  would  help  them  escalate  as  necessary  while
            giving vendors a reason to comply.



            Insider Threat Mitigation Is an Ongoing Process

            Human  error  and  disgruntled  employees  are  a natural  part  of doing  business.  In  other  words,  insider
            threats  will always  exist,  no matter  how often  the IT team  addresses  them.  While  this fact may  seem
            discouraging, it is a reminder to stay vigilant — threat mitigation is an ongoing process that evolves with
            time.



            About the Author

            Zac Amos is the Features Editor at ReHack, where he covers cybersecurity  and
            the tech industry. For more of his content, follow him on Twitter or LinkedIn.










            Cyber Defense eMagazine – August 2024 Edition                                                                                                                                                                                                          264
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   259   260   261   262   263   264   265   266   267   268   269