How to Have a Conversation with Your Third Parties on Cyber Risk during the Coronavirus Outbreak?

  • Ryan Spelman Ryan Spelman

Conversation with Your Third Parties on Cyber Risk during the Coronavirus Outbreak

Every day, headlines on the coronavirus outbreak continue to arouse fear, uncertainty and doubt about the future. Although epidemiologists, medical professionals and government leaders are working hard to try and contain the spread of the disease, the world is feeling its economic impact. There has been an impact to supply chains as factories and businesses have reduced workforces. Conferences and meetings have been canceled, and significant investments have been postponed.

At a time like this, cyber threats and your third parties may seem less of a priority, but it is critical to engage with your partners. As mentioned here, there are supply chain risks to consider, as well as cyber risks. Hackers and others leverage the days' headlines to goad employees into downloading malicious files or sharing their account information. Further, as more employees start working remotely, the ability for IT teams to ensure secure connections is tested. During this critical moment, it’s more important than before to engage with your third parties on cyber risk and have an honest dialogue on the happenings. We believe that conversation should be guided by the following:

Empathy

First and foremost, what is happening is a human tragedy as thousands have been directly impacted and millions have suffered due to travel restrictions or other economic impacts. Hence, when engaging with third parties, it is vital that the conversation start with empathy, as your point of contact may be feeling the pressure of this event at a personal level.

Awareness

Third parties, especially smaller ones, may not be aware of the cyber threats tied to coronavirus. It is vital to share vetted public information that they can use to avoid phishing or other attacks. The Cybersecurity and Infrastructure Security Agency, an agency of the U.S. Department of Homeland Security, has an informative page with links to the recent cyber alert on coronavirus-themed attacks.

Continuity

Many organizations have business continuity plans which should be reviewed now, if they haven't been implemented, before their implementation in the near future. Check with your third parties what steps they are taking to ensure their operations continue in the face of the coronavirus (or other challenges). If they are not familiar with what steps to take, it may be wise to share some best practices, such as what the U.S. Federal Emergency Management Agency offers or how your organization is coping with these challenges.

Compliance

The law is the law no matter what is occurring, and it is essential to keep the focus on your legal, ethical or other required obligations. Your third parties play an important part in securing data that you have been entrusted with. Hence, keeping the focus from the regulatory point of view will both streamline the conversation and elevate its importance. For example, keeping the conversation focused on how your third parties are securing access controls in compliance with the New York State Department of Financial Services' regulatory requirements will allow you to explore what they are doing with remote workers through an important and shared lens. 

These are challenging and difficult times. Your third parties, whether they are vendors, partners, stakeholders, or someone else, are feeling the pain as much as your organization. Of all our recommendations, empathy is the most important. 

This crisis will pass, and hopefully, by engaging and communicating with your third parties, your organization's third-party ecosystem will emerge stronger than before.

How to Have a Conversation with Your Third Parties on Cyber Risk during the Coronavirus Outbreak? 2020-03-27T00:00:00.0000000 /en/insights/publications/cyber/third-parties-cyber-risk-coronavirus-outbreak /-/media/kroll/images/publications/featured-images/2019/coronavirus-third-party-cyber-risk.jpg publication {78D3F940-BF08-40FB-A7F6-B55FB2D9165B} {8DDC49CA-1D0A-451A-A649-F026824A6638} {DDB3722E-3678-43FB-8989-224F6C919C9A} {144A7548-A9F0-4228-93CC-9A86304CD5E8}

Related Services

Cyber Risk

Cyber Risk

End-to-end cyber security services provided by unrivaled experts.

Cyber Risk
Cyber Risk

Cyber Risk Assessments

Delivering actionable recommendations using the best technology and expertise available.

Cyber Risk Assessments

Insights

Cyber Risk

Protecting Elections: Security Beyond the Machine

Cyber Risk
Cyber Risk

Qakbot Malware Now Exfiltrating Emails for Sophisticated Thread Hijacking Attacks

Cyber Risk
Cyber Risk

Be Better Prepared to Handle Imminent and Recurring Third-Party Cyber Risk

Cyber Risk
Cyber Risk

Proceed with Caution: Using Controls to Manage Risk in Digital Currency Transactions

Cyber Risk