01.03.2019 Views

CDM-CYBER-DEFENSE-eMAGAZINE-March-2019

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Why threat intelligence is the key to defending against<br />

Third party risks<br />

By Karen Levy, Senior Director of Product and Client Marketing at Recorded Future<br />

As the march of digitalization continues at an increasingly rapid pace, the business world has<br />

become steadily more complex and interconnected. Organizations now routinely rely on a<br />

widening web of suppliers and partners, often trusting them with sensitive data and mission critical<br />

systems.<br />

The advent of cloud-based services in particular has had a powerful effect on the way businesses<br />

operate, with an endless array of cloud-based service providers now available to meet practically<br />

any requirement. The adoption of IoT devices and mobile-centric working practices have likewise<br />

simultaneously created both more opportunity and more complexity.<br />

While this new interconnected world has unlocked powerful new strategies and business models,<br />

it can also drastically increase an organization’s exposure to security risks. Cybercriminals often<br />

use third-party service providers as a stepping stone to attack larger companies, exploiting their<br />

connections to evade the ultimate target’s security measures.<br />

The growing third-party risk<br />

Marking the scale of the problem, leading analyst group Forrester reports that third parties were<br />

the cause of 21 percent of confirmed breaches in 2018, up from 17 percent the year before. This<br />

figure is only likely to increase as organizations continue their digital transformation journey and<br />

incorporate yet more third-party elements into their operations.<br />

Some of the most notable security incidents of the last year were the result of third-party<br />

connections. The data breach reported by Ticketmaster in June for example was made possible<br />

by exploiting a flaw in JavaScript supplied by a third-party developer. Credit card details belonging<br />

to more than 40,000 customers were exposed as a result.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!