01.02.2024 Views

The Cyber Defense eMagazine February Edition for 2024

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine February Edition for 2024 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! 155 page February Edition fully packed with some of our best content. Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

So, monitoring and managing vendor security is no longer a nice to have. It is a need to have. And the<br />

regulators have taken notice. Most privacy laws include a cybersecurity audit or vendor due diligence<br />

requirement.<br />

For example, the General Data Protection Regulation (GDPR), the EU data privacy law, mandates due<br />

diligence on processors to ensure they comply with data protection and security measures. Review<br />

Articles 28, 24, 29 and 46 <strong>for</strong> their obligations regarding the roles of controllers and processors. Similarly,<br />

Article 9 of the Cali<strong>for</strong>nia Privacy Protection Act (CPPA) requires cybersecurity audits of service providers<br />

and the service provider’s corresponding cooperation. Similarly, the NY Shield Act obliges businesses to<br />

have “reasonable safeguards” that includes vendor due diligence.<br />

This evolving regulatory environment, coupled with the substantial risks and costs associated with<br />

vendor-related data breaches, underscores the need <strong>for</strong> a more sophisticated and robust approach to<br />

vendor management. Addressing these challenges is critical to safeguarding organizational and<br />

customer data in an increasingly interconnected ecosystem.<br />

Generative A.I. has a role to play in advancing an organization’s ability to comply with these regulations<br />

and improve the vendor management audit process.<br />

2. Current Vendor Management Practices<br />

Currently, vendor management is a procurement function that faces a headwind of silos and biased<br />

perception. When a buyer is in the market <strong>for</strong> a new vendor, the business owner conducts the search,<br />

ultimately choosing the vendor prior to the input from any other business unit. This selection in a silo<br />

process costs the organization which in turn puts pressure on procurement, legal, privacy and security<br />

teams to “approve” the vendor. While these teams likely are able to withstand such pressure; it is at a<br />

cost, which is the cost of their relationship with a colleague.<br />

In addition, each of these teams has their own agenda, priorities and expertise. Typically, the<br />

procurement team is incentivized to negotiate the best price, regardless of whether that may require<br />

<strong>for</strong>egoing some of the vendor’s offered security enhancements. Legal and privacy are responsible <strong>for</strong><br />

vendor compliance with policies and laws, which requires review of contract terms and redlining of<br />

unfavorable terms. <strong>The</strong> security team is similarly tasked with vendor compliance with policies and security<br />

regulations, which they satisfy through questionnaires or third-party audit reports.<br />

<strong>The</strong>re<strong>for</strong>e, not only must they be prepared with paperwork <strong>for</strong> the vendor and knowledge of privacy and<br />

cybersecurity, but they also have to be ready, at any given moment, to drop what they are doing and<br />

review the in<strong>for</strong>mation that the vendor sends back to them.<br />

All the while, the business unit buyer sees these colleagues as blockers to reaching the desired<br />

outcome.<br />

Finally, once the vendor is selected, the ongoing monitoring is even worse. Whose job is it to send the<br />

annual review? Who conducts that annual review and keeps track of it? How are they going to prove to<br />

the regulators that they have complied with the law?<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2024</strong> <strong>Edition</strong> 25<br />

Copyright © <strong>2024</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!