SlideShare uma empresa Scribd logo
1 de 16
1
A Podcast by Carrie Whysall
CynergisTek, Inc.
Supply Chain and Third-Party
Risks During COVID-19
2
© Carrie Whysall, 2020
Hello! I’m Carrie Whysall, Director of Managed Security Services at
CynergisTek, Inc. I’m here to introduce, and explain the importance of supply
chain, and third-party risks during the time of COVID-19.
3
What is vendor risk management?
© Carrie Whysall, 2020
It’s really the process of building relationships with your vendors. This includes
creating both formal and informal processes that protect and enhance the
organizational strategies for both parties in the relationship. The goal here being
having a transparent relationship that allows for a better understanding of the
services provided and the risks that are inherit in that relationship.
4
 Health Alliance Plan on March 6, 2019. This breach of 120,000 records was caused by
ransomware that their third-party vendor Wolverine Solutions Group became infected with. The
same third-party vendor was also the cause of a breach at Spectrum Health Lakeland. This one
is very concerning because not only did they get patient data, they got detailed provider info as
well.
 Federal Emergency Management Agency (FEMA) on March 22, 2019. This breach of 2.5 million
records is wrong in so many ways. After these victims were traumatized by hurricanes, they
were victimized a second time when a contractor being used by FEMA didn’t protect the
information that was provided to them.
 Quest Diagnostics on June 3, 2019. This breach exposed almost 17 million records. The breach
occurred because a hacker took control of a payments page that was being hosted by AMCA, a
third-party billing vendor used by Quest.
 Essentia Health on July 10, 2019. This breach was due to their third-party vendor California
Reimbursement Enterprise being the victim of a phishing attack. It has been nice months and
they are still unclear as to how many records were exposed.
© Carrie Whysall, 2020
Why is VRM so important?
5
© Carrie Whysall, 2020
An effective VRM program starts by comprehensively determining potential third-
party risks including process risks, political risks, unwanted functions, contract risks,
legal as well as regulatory issues for non-compliance, and information system
failures. This risk identification procedure should be followed by an evaluation of the
precise drivers that increase third-party risk.
VRM programs… where do I start?
6
© Carrie Whysall, 2020
4 tips for creating a VRM Program:
#1 Compile
#2 Classify
#3 Assess
#4 Decide
7
© Carrie Whysall, 2020
#1 Compile
Implementing the program starts by knowing all your vendors. Start with your finance
or accounting contacts to see what they have.
8
© Carrie Whysall, 2020
#2 Classify
Vendors need to be classified by how much potential risk they pose to the
organization. The potential risk is based on the potential impact that a breach
involving the vendor would have on the organization annually. This step is critical to
success and should not be decided by IT alone. If you have a current Mission Critical
and/or business critical list of applications are great places to start.
9
© Carrie Whysall, 2020
#3 Assess
There are typically two types of assessments that correspond with the two
classifications determined in the vendor classification form and each classification
follows a different assessment process.
For low risk vendors you may be able to complete the questionnaire with information
known internally to your organization. Once completed the questionnaires should be saved
with the vendor’s classification form and reviewed annually.
For high or critical risk vendors, it will require a more formal process which should include
documented responses from the vendors.
10
© Carrie Whysall, 2020
#4 Decide
For each of the high-risk vendors, a decision must be made of what to do with the risks
discovered through the assessment process.
 Risk Accepted: Accept the risk “as-is” without any additional effort on the part of
the organization or the vendor.
 Risk Accepted with remediation plan.
 Risk Unacceptable: There are two options for this finding.
 Work with the vendor on remediation/mitigation on their side.
 Decide to terminate the contract based on risk and follow the terms set forth
in the contract regarding termination of services.
 Note: one of the biggest mistakes an entity can make in this phase is
creating a remediation plan without follow through. Nothing stings more
than having an exposed risk occur because you didn’t complete the
remediation.
11
© Carrie Whysall, 2020
What types of assessments are
there ?
Pre-Procurement Assessment: this is typically a shorter assessment that is based primarily on
the organizations security policy with focus on technology, data storage, and connectivity
requirements. The goal here being that a quick decision on whether or not to use this product
from a particular vendor.
HIPAA-Based Risk Assessments: these are typically much longer assessments that focus on a
much broader range of HIPAA regulations. The questions are more in depth and typically
require detailed responses from a vendor. These assessments are also typically where a risk
level is assigned to a vendor.
12
What Are Some of the Challenges?
13
© Carrie Whysall, 2020
What issues arise throughout the
process?
 Asking the right questions.
 Having access to the contract documents.
 Getting the correct documents back for the vendors.
 Getting responses in a timely manner.
 Ensuring that going forward you update new contracts with requirements
for meeting your security requirements and retaining the ability to assess of
audit them periodically.
 Adding automation where you can.
 Effective use of the data you have gathered.
 Where else would this data be helpful to the organization?
 SOC/SIEM feeds
 Cyber insurance validation
 Supply chain
14
© Carrie Whysall, 2020
What about staffing?
 Vendor management can have a significant impact on staffing. Most entities do not have
additional bodies to pull for these efforts. Especially right now while we are struggling to staff
COVID-19 Units while having to institute furloughs in our elective procedure areas.
 At first the typical attempt is to assign portions of existing staff to this activity. These are
usually either existing security or compliance staff. Early efforts may be via Excel
spreadsheets and tracked manually.
15
© Carrie Whysall, 2020
…And what about outsourcing?
 Allows an organization to leverage the experience and existing vendor relationships the
outsourcer already has.
 Provides the benefit of access to subject matter experts (SME’s). No need to train existing
staff on the process.
 The agreements should contractually set SLA’s and turnaround times for expedited
requests.
 A higher number of assessments can be completed as the outsourced staff is working full
time on them not as part of another role.
 Standardized risk valuations, typically through the use of templates, which include – critical,
high, moderate, and low and clear definitions of each value.
 Assigning the assessment portions to a partner allows you to focus on remediation plans
and tasks instead of time on the phone or in email tracking down answers.
16
© Carrie Whysall, 2020
Thanks for tuning in! For more COVID-19 related podcast content, please visit
www.cynergistek.com/podcasts.

Mais conteúdo relacionado

Mais procurados

Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensaakash malhotra
 
Implementing the smart factory: New perspectives for driving value
Implementing the smart factory: New perspectives for driving valueImplementing the smart factory: New perspectives for driving value
Implementing the smart factory: New perspectives for driving valueDeloitte United States
 
COVID-19: Helping SMBs outmaneuver uncertainty
COVID-19: Helping SMBs outmaneuver uncertaintyCOVID-19: Helping SMBs outmaneuver uncertainty
COVID-19: Helping SMBs outmaneuver uncertaintyaccenture
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederlandreichske
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityDeloitte United States
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)Zero Science Lab
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channelflashnewsrelease
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEY
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Needsimplyme12345
 
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018accenture
 
What matters in security - A highlighter
What matters in security - A highlighterWhat matters in security - A highlighter
What matters in security - A highlighterAndre Muscat
 
IBM CIO Mid Market Study 2011
IBM CIO Mid Market Study 2011IBM CIO Mid Market Study 2011
IBM CIO Mid Market Study 2011ojwinslade
 
Addressing Sales Practice and Conduct Risk in the Canadian Market
Addressing Sales Practice and Conduct Risk in the Canadian MarketAddressing Sales Practice and Conduct Risk in the Canadian Market
Addressing Sales Practice and Conduct Risk in the Canadian Marketaccenture
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementCHRIS CLIFFORD
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write UpClaudia Toscano
 
Risk taking in SME's
Risk taking in SME'sRisk taking in SME's
Risk taking in SME'sBrian Stevens
 
2017 HK ESG Research Report
2017 HK ESG Research Report2017 HK ESG Research Report
2017 HK ESG Research ReportAlaya Consulting
 
Driving growth and differential performance among Class I railroads
Driving growth and differential performance among Class I railroadsDriving growth and differential performance among Class I railroads
Driving growth and differential performance among Class I railroadsDeloitte United States
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessibleCharmaine Servado
 
Oil & Gas ICT Leader 2016
Oil & Gas ICT Leader 2016Oil & Gas ICT Leader 2016
Oil & Gas ICT Leader 2016Ray Bugg
 

Mais procurados (20)

Cybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lensCybersecurity through the Deloitte lens
Cybersecurity through the Deloitte lens
 
Implementing the smart factory: New perspectives for driving value
Implementing the smart factory: New perspectives for driving valueImplementing the smart factory: New perspectives for driving value
Implementing the smart factory: New perspectives for driving value
 
COVID-19: Helping SMBs outmaneuver uncertainty
COVID-19: Helping SMBs outmaneuver uncertaintyCOVID-19: Helping SMBs outmaneuver uncertainty
COVID-19: Helping SMBs outmaneuver uncertainty
 
EY Digital Deal Economy - Nederland
EY Digital Deal Economy - NederlandEY Digital Deal Economy - Nederland
EY Digital Deal Economy - Nederland
 
The realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national securityThe realist’s guide to quantum technology and national security
The realist’s guide to quantum technology and national security
 
I Own Your Building (Management System)
I Own Your Building (Management System)I Own Your Building (Management System)
I Own Your Building (Management System)
 
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM ChanneleGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
eGestalt Named a 2012 'Emerging Vendor' by CRN and UBM Channel
 
Evolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architectureEvolution of cyber threats and the development of new security architecture
Evolution of cyber threats and the development of new security architecture
 
Security of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We NeedSecurity of the future - Adapting Approaches to What We Need
Security of the future - Adapting Approaches to What We Need
 
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018
The Bottom Line on Trust | Accenture Strategy Competitive Agility Index 2018
 
What matters in security - A highlighter
What matters in security - A highlighterWhat matters in security - A highlighter
What matters in security - A highlighter
 
IBM CIO Mid Market Study 2011
IBM CIO Mid Market Study 2011IBM CIO Mid Market Study 2011
IBM CIO Mid Market Study 2011
 
Addressing Sales Practice and Conduct Risk in the Canadian Market
Addressing Sales Practice and Conduct Risk in the Canadian MarketAddressing Sales Practice and Conduct Risk in the Canadian Market
Addressing Sales Practice and Conduct Risk in the Canadian Market
 
Marlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk ManagementMarlink IMO 2021 Guide to Cyber Risk Management
Marlink IMO 2021 Guide to Cyber Risk Management
 
Optiv Security Award Write Up
Optiv Security Award Write UpOptiv Security Award Write Up
Optiv Security Award Write Up
 
Risk taking in SME's
Risk taking in SME'sRisk taking in SME's
Risk taking in SME's
 
2017 HK ESG Research Report
2017 HK ESG Research Report2017 HK ESG Research Report
2017 HK ESG Research Report
 
Driving growth and differential performance among Class I railroads
Driving growth and differential performance among Class I railroadsDriving growth and differential performance among Class I railroads
Driving growth and differential performance among Class I railroads
 
eCrime-report-2011-accessible
eCrime-report-2011-accessibleeCrime-report-2011-accessible
eCrime-report-2011-accessible
 
Oil & Gas ICT Leader 2016
Oil & Gas ICT Leader 2016Oil & Gas ICT Leader 2016
Oil & Gas ICT Leader 2016
 

Semelhante a Supply Chain and Third-Party Risks During COVID-19

Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity EssayMichael Solomon
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfEnterprise Insider
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
Six Crucial Steps for Insurance Companies to Excel in Risk Management
Six Crucial Steps for Insurance Companies to Excel in Risk ManagementSix Crucial Steps for Insurance Companies to Excel in Risk Management
Six Crucial Steps for Insurance Companies to Excel in Risk Management360factors
 
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdfWhite-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdfOuheb Group
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants- Mark - Fullbright
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals Richard Brzakala
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber riskaakash malhotra
 
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...CBIZ, Inc.
 
financial exec final
financial exec finalfinancial exec final
financial exec finalAdam Ortlieb
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)Richard Brooks
 
Unlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial UnderwritingUnlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial UnderwritingCognizant
 
Risk & Advisory Services: Quarterly Risk Advisor March 2017
Risk & Advisory Services: Quarterly Risk Advisor March 2017Risk & Advisory Services: Quarterly Risk Advisor March 2017
Risk & Advisory Services: Quarterly Risk Advisor March 2017CBIZ, Inc.
 
Vendor Risk Mgmt Ravi-Licata
Vendor Risk Mgmt Ravi-LicataVendor Risk Mgmt Ravi-Licata
Vendor Risk Mgmt Ravi-LicataLena Licata
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016CBIZ, Inc.
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Smarter Faster Product Innovation - Strategic Imperatives for P&C Insurers
Smarter Faster Product Innovation - Strategic Imperatives for P&C InsurersSmarter Faster Product Innovation - Strategic Imperatives for P&C Insurers
Smarter Faster Product Innovation - Strategic Imperatives for P&C InsurersAccenture Insurance
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
New Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaperNew Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepapercraigwillis_newagehse
 

Semelhante a Supply Chain and Third-Party Risks During COVID-19 (20)

Cover and CyberSecurity Essay
Cover and CyberSecurity EssayCover and CyberSecurity Essay
Cover and CyberSecurity Essay
 
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdfStrengthening Supply Chain Security Against Cyber-Attacks.pdf
Strengthening Supply Chain Security Against Cyber-Attacks.pdf
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
Six Crucial Steps for Insurance Companies to Excel in Risk Management
Six Crucial Steps for Insurance Companies to Excel in Risk ManagementSix Crucial Steps for Insurance Companies to Excel in Risk Management
Six Crucial Steps for Insurance Companies to Excel in Risk Management
 
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdfWhite-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
White-Paper-Four-Keys-to-Creating-a-Vendor-Risk-Management-Program.pdf
 
Responding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for MerchantsResponding to a Data Breach, Communications Guidelines for Merchants
Responding to a Data Breach, Communications Guidelines for Merchants
 
Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals  Law Firm Hacked by Cyber Criminals
Law Firm Hacked by Cyber Criminals
 
Digital economy and its effect on cyber risk
Digital economy and its effect on cyber riskDigital economy and its effect on cyber risk
Digital economy and its effect on cyber risk
 
B crisis
B crisisB crisis
B crisis
 
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...
CBIZ Quarterly Manufacturing & Distribution “Hot Topics” Newsletter (Sep-Oct ...
 
financial exec final
financial exec finalfinancial exec final
financial exec final
 
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)Vendor Governance  -  Alyne Operational & Cyber Resilience White Paper (part 2)
Vendor Governance - Alyne Operational & Cyber Resilience White Paper (part 2)
 
Unlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial UnderwritingUnlocking the Performance Levers of Commercial Underwriting
Unlocking the Performance Levers of Commercial Underwriting
 
Risk & Advisory Services: Quarterly Risk Advisor March 2017
Risk & Advisory Services: Quarterly Risk Advisor March 2017Risk & Advisory Services: Quarterly Risk Advisor March 2017
Risk & Advisory Services: Quarterly Risk Advisor March 2017
 
Vendor Risk Mgmt Ravi-Licata
Vendor Risk Mgmt Ravi-LicataVendor Risk Mgmt Ravi-Licata
Vendor Risk Mgmt Ravi-Licata
 
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
Risk & Advisory Services: Quarterly Risk Advisor Feb. 2016
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Smarter Faster Product Innovation - Strategic Imperatives for P&C Insurers
Smarter Faster Product Innovation - Strategic Imperatives for P&C InsurersSmarter Faster Product Innovation - Strategic Imperatives for P&C Insurers
Smarter Faster Product Innovation - Strategic Imperatives for P&C Insurers
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
New Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaperNew Age HSE Services - Pics Auditing whitepaper
New Age HSE Services - Pics Auditing whitepaper
 

Último

Indore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort serviceIndore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort servicemaheshsingh64440
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋Sheetaleventcompany
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts servicerahul222jai
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
SANGLI CALL GIRL 92628/71154 SANGLI CALL
SANGLI CALL GIRL 92628/71154 SANGLI CALLSANGLI CALL GIRL 92628/71154 SANGLI CALL
SANGLI CALL GIRL 92628/71154 SANGLI CALLNiteshKumar82226
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000teencall080
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Ifra Zohaib
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotSivanyaPandeya
 
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...aakahthapa70
 
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...riyadelhic riyadelhic
 
Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Ifra Zohaib
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...aakahthapa70
 
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7shoniya sharma
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...riyadelhic riyadelhic
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort servicemaheshsingh64440
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579diyaspanoida
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.riyadelhic riyadelhic
 
BADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GBADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GNiteshKumar82226
 

Último (20)

Indore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort serviceIndore Call girl service 6289102337 indore escort service
Indore Call girl service 6289102337 indore escort service
 
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
💚😋Bangalore Escort Service Call Girls, ₹5000 To 25K With AC💚😋
 
Radhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts serviceRadhika Call Girls In Jaipur 9358660226 Escorts service
Radhika Call Girls In Jaipur 9358660226 Escorts service
 
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 12 Escort Service Noida N.C.R.
 
SANGLI CALL GIRL 92628/71154 SANGLI CALL
SANGLI CALL GIRL 92628/71154 SANGLI CALLSANGLI CALL GIRL 92628/71154 SANGLI CALL
SANGLI CALL GIRL 92628/71154 SANGLI CALL
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 60009891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
9891550660 Call Girls In Noida Sector 62 Short 1500 Night 6000
 
Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞Girls For Night in Islamabad | 03274100048 🔞
Girls For Night in Islamabad | 03274100048 🔞
 
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In RajkotRajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
Rajkot Call Girls Contact Number +919358341802 Call Girls In Rajkot
 
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...
Call Girls In {{Green Park Delhi}}9667938988 Indian Russian High Profile Esco...
 
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
Call Now HIgh profile ☎9870417354|| Call Girls in Ghaziabad Escort Service De...
 
Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048Call Girls in Luxus Grand Hotel | 💋 03274100048
Call Girls in Luxus Grand Hotel | 💋 03274100048
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
 
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7
Call Girls In mahipalpur (delhi) call me [8800343505 ] escort service 24X7
 
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
Call Now ☎9870417354|| Call Girls in Gurgaon Sector 13 Escort Service Gurgaon...
 
Bhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort serviceBhopal Call girl service 6289102337 bhopal escort service
Bhopal Call girl service 6289102337 bhopal escort service
 
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
Best VIP Call Girls Noida Sector 24 Call Me: 8700611579
 
Call Girls In Goa For Fun 9316020077 By Goa Call Girls For Pick Up Night
Call Girls In  Goa  For Fun 9316020077 By  Goa  Call Girls For Pick Up NightCall Girls In  Goa  For Fun 9316020077 By  Goa  Call Girls For Pick Up Night
Call Girls In Goa For Fun 9316020077 By Goa Call Girls For Pick Up Night
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
 
BADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GBADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL G
 

Supply Chain and Third-Party Risks During COVID-19

  • 1. 1 A Podcast by Carrie Whysall CynergisTek, Inc. Supply Chain and Third-Party Risks During COVID-19
  • 2. 2 © Carrie Whysall, 2020 Hello! I’m Carrie Whysall, Director of Managed Security Services at CynergisTek, Inc. I’m here to introduce, and explain the importance of supply chain, and third-party risks during the time of COVID-19.
  • 3. 3 What is vendor risk management? © Carrie Whysall, 2020 It’s really the process of building relationships with your vendors. This includes creating both formal and informal processes that protect and enhance the organizational strategies for both parties in the relationship. The goal here being having a transparent relationship that allows for a better understanding of the services provided and the risks that are inherit in that relationship.
  • 4. 4  Health Alliance Plan on March 6, 2019. This breach of 120,000 records was caused by ransomware that their third-party vendor Wolverine Solutions Group became infected with. The same third-party vendor was also the cause of a breach at Spectrum Health Lakeland. This one is very concerning because not only did they get patient data, they got detailed provider info as well.  Federal Emergency Management Agency (FEMA) on March 22, 2019. This breach of 2.5 million records is wrong in so many ways. After these victims were traumatized by hurricanes, they were victimized a second time when a contractor being used by FEMA didn’t protect the information that was provided to them.  Quest Diagnostics on June 3, 2019. This breach exposed almost 17 million records. The breach occurred because a hacker took control of a payments page that was being hosted by AMCA, a third-party billing vendor used by Quest.  Essentia Health on July 10, 2019. This breach was due to their third-party vendor California Reimbursement Enterprise being the victim of a phishing attack. It has been nice months and they are still unclear as to how many records were exposed. © Carrie Whysall, 2020 Why is VRM so important?
  • 5. 5 © Carrie Whysall, 2020 An effective VRM program starts by comprehensively determining potential third- party risks including process risks, political risks, unwanted functions, contract risks, legal as well as regulatory issues for non-compliance, and information system failures. This risk identification procedure should be followed by an evaluation of the precise drivers that increase third-party risk. VRM programs… where do I start?
  • 6. 6 © Carrie Whysall, 2020 4 tips for creating a VRM Program: #1 Compile #2 Classify #3 Assess #4 Decide
  • 7. 7 © Carrie Whysall, 2020 #1 Compile Implementing the program starts by knowing all your vendors. Start with your finance or accounting contacts to see what they have.
  • 8. 8 © Carrie Whysall, 2020 #2 Classify Vendors need to be classified by how much potential risk they pose to the organization. The potential risk is based on the potential impact that a breach involving the vendor would have on the organization annually. This step is critical to success and should not be decided by IT alone. If you have a current Mission Critical and/or business critical list of applications are great places to start.
  • 9. 9 © Carrie Whysall, 2020 #3 Assess There are typically two types of assessments that correspond with the two classifications determined in the vendor classification form and each classification follows a different assessment process. For low risk vendors you may be able to complete the questionnaire with information known internally to your organization. Once completed the questionnaires should be saved with the vendor’s classification form and reviewed annually. For high or critical risk vendors, it will require a more formal process which should include documented responses from the vendors.
  • 10. 10 © Carrie Whysall, 2020 #4 Decide For each of the high-risk vendors, a decision must be made of what to do with the risks discovered through the assessment process.  Risk Accepted: Accept the risk “as-is” without any additional effort on the part of the organization or the vendor.  Risk Accepted with remediation plan.  Risk Unacceptable: There are two options for this finding.  Work with the vendor on remediation/mitigation on their side.  Decide to terminate the contract based on risk and follow the terms set forth in the contract regarding termination of services.  Note: one of the biggest mistakes an entity can make in this phase is creating a remediation plan without follow through. Nothing stings more than having an exposed risk occur because you didn’t complete the remediation.
  • 11. 11 © Carrie Whysall, 2020 What types of assessments are there ? Pre-Procurement Assessment: this is typically a shorter assessment that is based primarily on the organizations security policy with focus on technology, data storage, and connectivity requirements. The goal here being that a quick decision on whether or not to use this product from a particular vendor. HIPAA-Based Risk Assessments: these are typically much longer assessments that focus on a much broader range of HIPAA regulations. The questions are more in depth and typically require detailed responses from a vendor. These assessments are also typically where a risk level is assigned to a vendor.
  • 12. 12 What Are Some of the Challenges?
  • 13. 13 © Carrie Whysall, 2020 What issues arise throughout the process?  Asking the right questions.  Having access to the contract documents.  Getting the correct documents back for the vendors.  Getting responses in a timely manner.  Ensuring that going forward you update new contracts with requirements for meeting your security requirements and retaining the ability to assess of audit them periodically.  Adding automation where you can.  Effective use of the data you have gathered.  Where else would this data be helpful to the organization?  SOC/SIEM feeds  Cyber insurance validation  Supply chain
  • 14. 14 © Carrie Whysall, 2020 What about staffing?  Vendor management can have a significant impact on staffing. Most entities do not have additional bodies to pull for these efforts. Especially right now while we are struggling to staff COVID-19 Units while having to institute furloughs in our elective procedure areas.  At first the typical attempt is to assign portions of existing staff to this activity. These are usually either existing security or compliance staff. Early efforts may be via Excel spreadsheets and tracked manually.
  • 15. 15 © Carrie Whysall, 2020 …And what about outsourcing?  Allows an organization to leverage the experience and existing vendor relationships the outsourcer already has.  Provides the benefit of access to subject matter experts (SME’s). No need to train existing staff on the process.  The agreements should contractually set SLA’s and turnaround times for expedited requests.  A higher number of assessments can be completed as the outsourced staff is working full time on them not as part of another role.  Standardized risk valuations, typically through the use of templates, which include – critical, high, moderate, and low and clear definitions of each value.  Assigning the assessment portions to a partner allows you to focus on remediation plans and tasks instead of time on the phone or in email tracking down answers.
  • 16. 16 © Carrie Whysall, 2020 Thanks for tuning in! For more COVID-19 related podcast content, please visit www.cynergistek.com/podcasts.