Page 25 - Cyber Defense eMagazine February 2024
P. 25

So, monitoring and managing vendor security is no longer a nice to have. It is a need to have. And the
            regulators have taken notice.  Most privacy laws include a cybersecurity audit or vendor due diligence
            requirement.

             For example, the General Data Protection Regulation (GDPR), the EU data privacy law, mandates due
            diligence  on processors  to  ensure  they comply  with  data  protection  and security  measures.  Review
            Articles 28, 24, 29 and 46 for their obligations regarding the roles of controllers and processors. Similarly,
            Article 9 of the California Privacy Protection Act (CPPA) requires cybersecurity audits of service providers
            and the service provider’s corresponding cooperation. Similarly, the NY Shield Act obliges businesses to
            have “reasonable safeguards” that includes vendor due diligence.

             This  evolving  regulatory  environment,  coupled  with  the  substantial  risks  and  costs  associated  with
            vendor-related data breaches, underscores the need for a more sophisticated and robust approach to
            vendor  management.  Addressing  these  challenges  is  critical  to  safeguarding  organizational  and
            customer data in an increasingly interconnected ecosystem.

             Generative A.I. has a role to play in advancing an organization’s ability to comply with these regulations
            and improve the vendor management audit process.



            2. Current Vendor Management Practices


             Currently, vendor management is a procurement function that faces a headwind of silos and biased
            perception. When a buyer is in the market for a new vendor, the business owner conducts the search,
            ultimately choosing the vendor prior to the input from any other business unit. This selection in a silo
            process costs the organization which in turn puts pressure on procurement, legal, privacy and security
            teams to “approve” the vendor. While these teams likely are able to withstand such pressure; it is at a
            cost, which is the cost of their relationship with a colleague.

             In  addition,  each  of  these  teams  has  their  own  agenda,  priorities  and  expertise.  Typically,  the
            procurement team is incentivized to negotiate the best price, regardless of whether that may require
            foregoing some of the vendor’s offered security enhancements. Legal and privacy are responsible for
            vendor  compliance  with  policies  and  laws,  which  requires  review  of  contract  terms  and  redlining  of
            unfavorable terms. The security team is similarly tasked with vendor compliance with policies and security
            regulations, which they satisfy through questionnaires or third-party audit reports.

             Therefore, not only must they be prepared with paperwork for the vendor and knowledge of privacy and
            cybersecurity, but they also have to be ready, at any given moment, to drop what they are doing and
            review the information that the vendor sends back to them.
             All  the  while,  the  business  unit  buyer  sees  these  colleagues  as  blockers  to  reaching  the  desired
            outcome.

             Finally, once the vendor is selected, the ongoing monitoring is even worse. Whose job is it to send the
            annual review? Who conducts that annual review and keeps track of it? How are they going to prove to
            the regulators that they have complied with the law?





            Cyber Defense eMagazine – February 2024 Edition                                                                                                                                                                                                          25
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   20   21   22   23   24   25   26   27   28   29   30