Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity & Business ResilienceCybersecurity News

7 Strategies to Defend Against Supply Chain Risks in the Digital Era

By Javvad Malik
supply chain images
November 8, 2016

With the rise of digital and cloud technologies, business models have evolved greatly. In recent years, we’ve seen an increasing number of businesses that are essentially “born in the cloud,” with infrastructure that is fully supported by cloud services. For example, Amazon Web Services (AWS) makes it affordable and easy to start an online company that can scale to compete with larger, well-funded rivals. Similarly, YouTube makes it easy to create and distribute promotional videos, while other social media channels, such as Facebook and Twitter, enable company messaging and marketing campaigns to reach millions around the world. The internet and the cloud are the great equalizers – allowing startups to effectively compete with established companies of any size.

But even brick and mortar companies are increasingly leveraging the internet and cloud services to expand their business. As traditional business models have changed to incorporate these resources, the security risks presented have evolved as well. In today’s world of digital business, the security risks faced by the majority of companies have largely shifted into the cyber realm.

In addition, businesses today now have a much larger dependency on third-party providers and suppliers than they’ve ever had in the past. While suppliers can allow companies to be more innovative, create new products, and further level the playing field against larger competitors, there are also many new dangers and risks that can arise in such distributed ecosystems.

These risks are not hypothetical. Over the past few years, two of the more memorable cases of third-party partners causing security breaches involve The Home Depot and Target. In November 2014, Home Depot disclosed a breach perpetrated by hackers who broke into corporate systems using credentials stolen from a third-party vendor. In December 2013, Target suffered a huge data breach that resulted in 70 million stolen credit card records. The attackers were able to breach Target’s system via a third-party HVAC provider. And other data breaches and security vulnerabilities seem to make it into news headlines on a regular basis.

Protecting Against Supply Chain Risks in the Digital Era

Third-party partners and suppliers remain essential requirements for any business, but for cloud-based companies, this dependency is significantly elevated. It is critical that companies understand and take appropriate steps to manage the risks in their supply chain.

Here are seven best practices that can help all organizations – whether cloud-based or traditional, large or small – protect against third-party threats.

  1. Implement a Business Impact Assessment: Conduct a business impact assessment to understand the level of dependency on each third-party partner. Typically, third parties that play a more critical role in supporting the business will present greater security risks.
  2. Know Your Partners: Keep an up-to-date and accurate record of all business partners and the role that each plays. Relationships evolve over time, and it is important that any changes are captured as they happen.
  3. Document Security Policies: Have a security policy documented for third parties that explains what is expected, how data should be handled, and what needs to happen in the event of an incident. Legal counsel should also be sought to ensure that the terms of such documents are legally binding and enforceable.
  4. Prioritize Communication and Education: Communicate security needs to all partners. Some third parties may not yet appreciate the need for security. If awareness is lacking in the partner ecosystem, an element of education should also be considered.
  5. Provide Technical Assurance: Implement technical controls, especially when a third party has direct access to corporate systems. The existence of certifications and audits can help provide this assurance. However, additional technical assurance can be gained via penetration testing and vulnerability scanning, or by deploying monitoring controls in the partner environment. These strategies can provide a much-needed additional layer of protection.
  6. Leverage Threat Intelligence: Use threat intelligence to understand attack vectors and identify vulnerability points where a third party may have been breached. Threat intelligence provides actionable information about emerging security threats, helping organizations better detect and respond to them.  
  7. Create an Incident Response Plan: Create and document a joint incident response plan that clearly maps out roles and responsibilities in the event of an incident at a third party. Plans should include technical controls, such as isolating critical environments; PR and media communication strategies; and ways to end or replace the third-party service temporarily, or even permanently if a serious breach occurs.

Partners and suppliers are a critical part of a company’s success in the digital era. However, it’s important that organizations understand the risks that lie within the supply chain and take appropriate steps to protect themselves. By implementing the aforementioned best practices into third-party security strategies, organizations can go a long way toward enhancing their ability to detect threats, and respond in a fast and efficient manner if a security breach occurs.

KEYWORDS: cybersecurity preparedness supply chain cyber security supply chain risk supply chain security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Javvad Malik is a security advocate at AlienVault. He’s also a co-founder of Security B-Sides London. An active blogger, event speaker and industry commentator, Malik is known as one of the industry’s most prolific video bloggers with a signature fresh and light-hearted perspective on security.

Prior to joining AlienVault, he was a senior analyst with 451 Research providing technology vendors, investors and end users with strategic advisory services, including competitive research and go-to-market positioning. Prior to that, Malik served as an independent security consultant, with a career spanning more than 12 years working for some of the largest companies across the financial and energy sectors.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Podcast- Welch.jpg

    Listen to Michael Welch and how to address fourth-party risks and improve supply chain security in our latest The Security Podcast episode

    See More
  • Supply chain

    Managing third-party risks in the supply chain

    See More
  • Person-working-in-laptop.jpg

    7 ways to protect against cybersecurity threats in digital onboarding

    See More

Related Products

See More Products
  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing