Underwriting the Invisible: Third-Party Cyber Exposure in Connected Supply Chains

CATEGORIES

See how it works

Explore the Federato platform at your own pace with our free interactive product tour.

Take a tour

Today's supply chains are built on a network of partnerships. These include vendors, service providers, and suppliers who support daily operations across industries. Many of these partners have digital access to a company's systems or data.

This digital access creates risks. When a vendor's network is compromised, attackers often gain a path into the company's own systems. These threats are called third-party cyber exposures.

These exposures are difficult to see, track, or quantify. Yet they represent a growing share of cyber incidents affecting businesses today.

Understanding Third-Party Cyber Exposure

Third-party cyber exposure happens when outside organizations with access to your systems create security risks. This includes vendors, contractors, and supply chain partners who connect to your network or handle your data.

These risks often go unnoticed because they exist outside your direct control. Many vendor relationships operate behind the scenes, and their security practices aren't always visible.

Recent studies show that about 15% of data breaches start with third parties. These incidents typically cost more than other types of breaches. This happens because companies have less visibility and control over their partners' security.

In connected supply chains, problems can spread quickly. A security issue at one vendor might expose customer data, disrupt operations, or violate regulations. These problems can move from one company to another like a chain reaction.

Digital supply chain security involves both direct and indirect connections. This means you're exposed not just to your own vendors' risks, but potentially to their vendors' risks too. Tracking all these relationships is challenging and often incomplete.

Why Upstream and Downstream Risks Affect Every Organization

Cyber risks flow in both directions through digital connections. Upstream risks come from suppliers to your organization. Downstream risks flow from your organization to clients or customers.

A cyber incident can cause problems in both directions. For example, when a software provider gets hacked, the compromised code affects every customer using that software. Similarly, if your company experiences a breach, it might expose data that your suppliers can access.

  • Real-world impact: In 2020, cloud provider Blackbaud suffered a ransomware attack that exposed data from hundreds of nonprofits and schools. In 2021, attackers used Kaseya's IT platform to spread malware to thousands of businesses.
  • Regulatory concerns: Laws like GDPR in Europe and various state regulations in the US now require companies to manage risks from third-party relationships. These rules demand proper due diligence and documentation of vendor security practices.

Digital connections create various types of risk:

  • Upstream risks:
    • Data breaches through vendor system access
    • Service disruptions from vendor outages
    • Exposure of login credentials
    • Unpatched software vulnerabilities
  • Downstream risks:
    • Customer data exposure
    • Reputation damage
    • Regulatory fines
    • Service disruptions

Key Steps For A Third-Party Risk Management Plan

A good risk management plan helps you find, evaluate, and handle cyber risks from external partners. Here's how to build one:

1. Catalog And Prioritize Vendors

Start by listing all outside organizations that connect to your systems or handle your data. Then rank them based on how important they are and what kind of access they have.

You can group vendors by business importance or by risk level. Business-focused grouping looks at how critical they are to operations. Risk-based grouping considers factors like data sensitivity and system access.

Vendor Level What They Access How Often to Check What to Requir
Critical Sensitive data or full systems Every 3 months Complete security review
High Limited sensitive data Every 6 months Security questionnaire with evidence
Medium Non-sensitive data only Once a year Basic questionnaire
Low No data access Every 2 years Simple screening

2. Score And Monitor Vendor Security

Evaluating vendor security involves collecting information through standard tools and checking that information using outside data sources.

  • Security questionnaires: Standard forms like SIG or CAIQ ask vendors about their security policies and practices.
  • Security ratings: Services like SecurityScorecard provide independent scores based on observable security signals like patch management and network configurations.
  • Technical checks: Penetration testing and vulnerability scans directly test a vendor's security by simulating attacks to find weaknesses.

Automated monitoring tools track changes in vendor security over time. These tools alert you when risk levels increase, so you can reassess based on current information.

3. Enforce Risk Mitigation Strategies

Once you identify risks, you need ways to reduce them:

  • Contract requirements: Include specific security expectations in vendor agreements, covering data protection, breach notification, and security standards.
  • Improvement plans: When vendors fall short of security expectations, work together on specific improvements with clear timelines.
  • Backup controls: If vendor risks remain, add extra protections like network segmentation, access restrictions, or additional monitoring.

4. Reassess And Update Coverage Terms

Insurance coverage should reflect each vendor's risk profile. As your assessments change, your insurance approach might need updates too:

  • Policy language: Make sure policies clearly define what third-party incidents are covered and what documentation is required.
  • Exclusions: Be aware of policy limitations for unapproved vendors, known vulnerabilities, or failure to maintain security standards.
  • Coverage extensions: Consider additional protection for business interruption caused by vendors or coverage for indirect (fourth-party) risks.

How Continuous Monitoring Protects Your Supply Chain

Point-in-time assessments only show vendor security at a single moment. They rely on questionnaires and audits that quickly become outdated as threats evolve.

Continuous monitoring tracks security in real time. These systems collect data from across the internet to provide updated insights into vendor vulnerabilities and exposures. They automatically check for changes in network settings, patch management, and security incidents.

Benefits of real-time supplier risk rating:

  • Early warning: Detect security issues before they cause damage
  • Complete visibility: See connections between vendors and their partners
  • Current information: Make decisions based on today's risk, not last year's assessment

Alert thresholds help you decide when a change in risk requires action. These thresholds depend on how critical the vendor is and your risk tolerance. For example, a sudden drop in a security score might trigger a review.

Threat intelligence feeds enhance monitoring by providing information about new threats. These feeds gather data from global sources and help identify risks before they cause harm.

For underwriters, continuous data improves risk pricing accuracy. Real-time information allows adjustments to exposure assumptions and coverage terms as vendor risk levels change.

Best Practices For Incident Response With Vendor Breaches

When a third-party breach occurs, you need a clear plan that coordinates actions between your organization and the affected vendor.

1. Activate Response Protocols

When you discover a third-party breach, follow these steps:

  • First steps:
    • Confirm where the breach started and what systems it affects
    • Determine what types of data might be exposed
    • Document when events happened and which systems were involved
  • Vendor communication:
    • Contact the vendor's incident response team immediately
    • Request details about the breach timeline and affected data
    • Set up a shared communication channel for updates
  • Documentation for insurance:
    • Collect evidence including emails, logs, and vendor reports
    • Keep records of all decisions and actions taken
    • Submit information to insurers according to your policy requirements

2. Communicate With Stakeholders

Clear communication during a breach follows legal requirements and keeps everyone informed:

  • Regulatory requirements:
    • Follow data breach notification laws in your jurisdiction
    • Notify regulators within required timeframes (often 72 hours or less)
    • Include specific details about the breach and its impact
  • Customer communication:
    • Use clear, factual language to inform affected individuals
    • Explain what happened, what data was involved, and what to do next
    • Provide ways for customers to ask questions
  • Media response:
    • Prepare statements with the vendor when appropriate
    • Choose a spokesperson and approve messages across departments
    • Monitor public response and update as needed

3. Review Findings And Update Risk Models

After containing the incident, review what happened and use the lessons to improve:

  • Analysis approach:
    • Identify the root cause and timeline
    • Evaluate how well the vendor responded
    • Document corrective actions taken
  • Risk model updates:
    • Reassess the vendor's security rating based on how they handled the incident
    • Adjust risk levels and access permissions if needed
    • Consider changes to contract requirements
  • Broader application:
    • Identify similar vendors with comparable access
    • Check their controls using the same criteria
    • Update your assessment process based on lessons learned

Broker And Underwriter Collaboration In Cyber Risk

Brokers and underwriters play complementary roles in managing third-party cyber risk. Brokers help clients understand and address their exposures, while underwriters evaluate those risks to determine coverage and pricing.

Brokers can help clients identify which vendors have access to sensitive systems or data. They collect information about vendor relationships, security practices, and existing controls. This information helps underwriters assess risk more accurately.

What brokers provide:

  • Guidance on documenting vendor relationships
  • Help preparing security questionnaires and evidence
  • Explanation of insurer expectations for third-party management

What underwriters need:

  • Vendor categorization by risk level
  • Controls for high-risk vendor access
  • Monitoring practices and reassessment frequency
  • History of previous third-party incidents

Standard assessment tools like SIG questionnaires help ensure consistency. When brokers use these formats, underwriters can compare submissions more easily and apply risk models more effectively.

Some insurers and brokers develop shared frameworks for risk scoring. These frameworks include scoring thresholds, risk tiers, and required documentation. This collaboration supports faster underwriting decisions and clearer communication.

The broker's role in third-party data protection includes helping clients understand their exposures and implement appropriate controls. Underwriters contribute by defining clear standards for what constitutes acceptable risk management. Together, they create a more transparent and consistent approach to third-party cyber risk.

Charting A New Path Forward In Cyber Underwriting

New technologies are transforming how we evaluate vendor and supply chain cyber risks. These innovations help make more accurate decisions based on current data rather than static assessments.

AI and machine learning analyze large sets of vendor data to identify security patterns and detect unusual behavior. These tools speed up risk scoring and continuously update as new information becomes available.

Attack surface mapping visualizes connections between organizations, showing both direct vendor relationships and indirect links. This makes it easier to spot hidden dependencies that could increase cyber exposure.

Some insurers now use shared platforms that allow underwriters, brokers, and clients to work from a single source of information when evaluating third-party risk. These tools streamline data collection and simplify tracking vendor security over time.

FAQs About Third-Party Cyber Exposure

How can organizations identify all third-party vendors in their supply chain?

‍‍‍Organizations can identify third-party vendors by reviewing procurement records, accounts payable systems, and network access logs. Cross-departmental reviews help verify that the vendor inventory is complete and accurate.

What metrics should underwriters use to evaluate third-party cyber risk?

‍‍‍‍‍‍Underwriters evaluate third-party cyber risk using security ratings, compliance certifications, incident history, data access levels, and the maturity of the vendor's own risk management program.

How frequently should vendor security assessments be updated?

‍‍‍‍‍‍Vendor security assessments should be updated quarterly for critical vendors with access to sensitive data, while maintaining continuous monitoring for security events that might trigger immediate reassessment.