How to Secure the Extended Enterprise - CISO Insights on Third-Party Risk

For Chief Information Security Officers (CISOs), mitigating third-party risks requires a strategic blend of technological rigor, contractual accountability, and cross-organizational collaboration. Recent high-profile supply chain attacks, such as compromised software updates and credential leaks at service providers, highlight the cascading impact of weak third-party security. By empowering vendors with tools, knowledge, and shared incentives, CISOs transform third-party relationships from vulnerabilities into strategic assets. Third-party breaches now account for over 60% of cybersecurity incidents, with attackers exploiting vulnerabilities in vendor systems to bypass enterprise defenses. The future of third-party security lies in recognizing that every vendor is an extension of the enterprise, deserving the same vigilance as internal systems. High-risk vendors, such as cloud providers or IT managed services, demand deeper scrutiny, including on-site audits and real-time security telemetry sharing. Replace static audits with continuous monitoring tools like Security Ratings Services (SRS) that analyze vendors’ external attack surfaces. CISOs must foster a culture where vendors view security as a collaborative mission rather than a compliance checkbox. CISOs who prioritize continuous monitoring, contractual accountability, and collaborative defense frameworks will mitigate risks and strengthen their organization’s competitive resilience. Modern organizations rely on a sprawling network of third-party vendors, suppliers, and partners to drive innovation and operational efficiency. For example, hosting quarterly threat briefings with key vendors builds mutual awareness of emerging attack vectors like AI-driven phishing or zero-day exploits. Securing the extended enterprise demands a paradigm shift from reactive compliance to proactive partnership in an era of relentless cyber threats. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. CISOs must recognize that their organization’s risk posture is only as strong as the weakest vendor in their ecosystem. Proactive CISOs align these pillars with business objectives, ensuring risk management enhances agility rather than stifling innovation. Instead, a dynamic, data-driven strategy is essential to identifying, monitoring, and remediating risks across the entire vendor lifecycle from onboarding to offboarding. As attack surfaces expand, malicious actors increasingly target weaker links in the supply chain to infiltrate otherwise secure enterprises. Classify vendors based on their access to sensitive data, criticality to operations, and historical performance. Implement network segmentation, multi-factor authentication (MFA), and just-in-time (JIT) access to minimize lateral movement opportunities during a breach.

This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 23 Apr 2025 01:05:09 +0000


Cyber News related to How to Secure the Extended Enterprise - CISO Insights on Third-Party Risk

ProcessUnity Introduces Industry's All-In-One Third-Party Risk Management Platform - PRESS RELEASE. BOSTON-(BUSINESS WIRE)- ProcessUnity, provider of comprehensive end-to-end third-party risk management and cybersecurity solutions to leading enterprises, today announced the completed integration of the Global Risk Exchange. The newly ...
1 year ago Darkreading.com
CISO Conversations: Nick McKenzie and Chris Evans - In this edition of CISO Conversations, SecurityWeek discusses the role of the CISO with two CISOs from the major crowdsourced hacking organizations: Nick McKenzie at Bugcrowd and Chris Evans at HackerOne. The purpose, as always, is to help aspiring ...
1 year ago Packetstormsecurity.com
16 top ERM software vendors to consider in 2024 - Enterprise risk management software helps organizations identify, mitigate and remediate business risks, which can lead to improved business performance. The risk management market is rapidly evolving from separate tools across different risk domains ...
1 year ago Techtarget.com
The Role of the CISO in Digital Transformation - Modern-day demands require organizations to be flexible and digitally savvy, getting work done remotely and in the public cloud as often as in a centralized physical location, if not more so. As companies continue to modernize their workflows and ...
1 year ago Darkreading.com
Third-Party Security Assessments: Vendor Risk Management - As businesses rely more heavily on external vendors to provide critical services and support, the importance of effective vendor risk management strategies becomes paramount. This article explores the significance of third-party security assessments, ...
1 year ago Securityzap.com
How to Build a Cyber Risk Tolerance Statement for Your Organization as a CISO - Creating an effective cyber risk appetite statement requires a structured approach that begins with a thorough understanding of your organization’s risk profile, business model, and strategic objectives. A well-defined cyber risk appetite ...
1 week ago Cybersecuritynews.com
Master Security by Building on Compliance with A Risk-Centric Approach - In recent years, a confluence of circumstances has led to a sharp rise in IT risk for many organizations. That's why a proactive approach to seeing, understanding, and acting on risk is key to improving the effectiveness of defenses in place to meet ...
1 year ago Cyberdefensemagazine.com
A Cybersecurity Risk Assessment Guide for Leaders - Now more than ever, keeping your cyber risk in check is crucial. In the first half of 2022's Cyber Risk Index, 85% of the survey's 4,100 global respondents said it's somewhat to very likely they will experience a cyber attack in the next 12 months. ...
2 years ago Trendmicro.com
Appointments of New Chief Information Security Officers in the United States in January 2023 - Corporate security is undergoing a lot of changes as businesses attempt to keep up with the ever-changing threat landscape. To ensure the safety of both employees and customers, many companies are now hiring a Chief Security Officer or Chief ...
2 years ago Csoonline.com
How to Secure the Extended Enterprise - CISO Insights on Third-Party Risk - For Chief Information Security Officers (CISOs), mitigating third-party risks requires a strategic blend of technological rigor, contractual accountability, and cross-organizational collaboration. Recent high-profile supply chain attacks, such as ...
4 hours ago Cybersecuritynews.com
Is the vCISO model right for your business? - It's getting harder to justify not having a CISO, so many businesses that have never had a CISO are filling the gap with a virtual CISO. A vCISO, sometimes referred to as a fractional CISO or CISO-as-a-Service, is typically a part-time outsourced ...
1 year ago Darkreading.com
Definition from TechTarget - The CISO is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external ...
1 year ago Techtarget.com
Why CISOs and CIOs Should Work Together More Closely - Although there are overlaps in the goals and responsibilities of the CIO and the CISO, there are also challenges that get in the way of a more cohesive relationship, including reporting lines, organizational structures, budgets, and risk appetites. A ...
1 year ago Feedpress.me
Building a Cyber Risk Appetite Statement for Your Organization - Designing a meaningful cyber risk appetite statement requires careful consideration of the organization’s unique context, industry, and risk landscape. The true value of a cyber risk appetite statement is realized only when it is actively ...
1 day ago Cybersecuritynews.com
Third-party breaches hit 90% of top global energy companies - A new report from SecurityScorecard reveals a startling trend among the world's top energy companies, with 90% suffering from data breaches through third parties over the last year. This sheds light on the need for these energy companies to adopt a ...
1 year ago Securityintelligence.com
Critical Start Implements Cyber Risk Assessments With Peer Benchmarking and Prioritization Engine - PRESS RELEASE. PLANO, Texas, Jan. 11, 2024 /PRNewswire/ - Today, Critical Start, a leading provider of Managed Detection and Response cybersecurity solutions and pioneer of Managed Cyber Risk Reduction, announced general availability of Critical ...
1 year ago Darkreading.com
How to manage third-party risk in the cloud - The increasing levels of access and integration within cloud environments create risks and potential new avenues of compromise for cloud customers. Organizations can hope their cloud service providers are secure, but that's not always the case. It's ...
1 year ago Techtarget.com
The New CISO: Rethinking the Role - Dating back to the 1990s, the role of CISO was more technical and IT-focused. CISOs face more risks than can be resolved, are expected to balance security with operational capability, and must convince leaders to invest in protection. Today, CISOs ...
1 year ago Darkreading.com
Third-party risk management best practices and why they matter - With organizations increasingly relying on third-party vendors, upping the third-party risk management game has become imperative to prevent the fallout of third-party compromises. SecurityScorecard recently found that 98% of organizations are ...
1 year ago Helpnetsecurity.com
Key elements for a successful cyber risk management strategy - In this Help Net Security interview, Yoav Nathaniel, CEO at Silk Security, discusses the evolution of cyber risk management strategies and practices, uncovering common mistakes and highlighting key components for successful risk resolution. Nathaniel ...
1 year ago Helpnetsecurity.com
Key Takeaways from the Gartner® Market Guide for Insider Risk Management - Insider risk incidents are on the rise and becoming more costly to contain. As a result, earlier this year, Gartner predicted that 50% of all medium to large enterprises would adopt insider risk programs. The report reveals several key findings about ...
1 year ago Securityboulevard.com
Third-Party Risk Management - How to Build a Strong TPRM Program - Effective leaders demonstrate this commitment by regularly including third-party risk discussions in board meetings, allocating sufficient budget for TPRM tools and personnel, and reinforcing the importance of following established protocols even ...
1 week ago Cybersecuritynews.com
Cybersecurity is a Team Sport - Good security hygiene needs to be a fundamental part of company culture, and leadership should make it clear that proper security practices are part of achieving business objectives. Infusing security and operational resilience throughout the ...
1 year ago Darkreading.com
CVE-2020-8023 - A acceptance of Extraneous Untrusted Data With Trusted Data vulnerability in the start script of openldap2 of SUSE Enterprise Storage 5, SUSE Linux Enterprise Debuginfo 11-SP3, SUSE Linux Enterprise Debuginfo 11-SP4, SUSE Linux Enterprise Point of ...
4 years ago
The Cyber Risk Nightmare and Financial Risk Disaster of Using Personal Messaging Apps in The Workplace - This practice, which is unfortunately still widespread in an environment of relentless cyberattacks, is fraught with major cyber and financial risk. Unsecure messaging apps are a gateway for cybercriminals to access, expose and exploit an ...
1 year ago Cyberdefensemagazine.com

Latest Cyber News


Cyber Trends (last 7 days)