<div dir="ltr"><a href="http://www.beckershospitalreview.com/healthcare-information-technology/cyber-attack-vector-du-jour-third-party-digital-ecosystem.html">http://www.beckershospitalreview.com/healthcare-information-technology/cyber-attack-vector-du-jour-third-party-digital-ecosystem.html</a><br><br><p>The <a href="http://www.beckershospitalreview.com/healthcare-information-technology/vendor-error-leaves-18k-chi-franciscan-hospital-patients-information-available-online.html">data breach at CHI Franciscan Hospital</a>
in September is a recent example of what has been a troubling increase
in cyber-attacks on the healthcare industry – entry through a trusted
third party.</p>
<p>The common attack vector between this breach and many others, including the <a href="https://www.bostonglobe.com/business/2016/06/29/data-breach-mass-general-involves-dental-patients/bnzo96XScLKQC8Wt2Wk7eO/story.html">Mass. General Hospital breach in June</a>,
is a healthcare provider's third party, or "business associate," as
defined by the Department of Health and Human Services. Breaches via a
third party are a rapidly growing technique of bad actors looking to
circumvent security controls put in place by sophisticated security
teams. It's less taxing on bad actors to simply breach a third party
with weak controls and enter secure networks via a trusted connection.</p>
<p>Third party breaches continue to occur despite changes made over
three years ago to extend HIPAA Privacy and Security Rules for
protection and control of personal health information to business
associates of covered entities that receive protected health
information, such as contractors and subcontractors. In a recent <a href="http://www2.deloitte.com/ye/en/pages/risk/articles/third-party-governance-and-risk-management.html">Deloitte survey of 170 organizations</a>,
87 percent of the respondents said they have faced a disruptive
third-party incident in the last two to three years. To complicate the
issue even more, E&Y cited that almost half of firms in their study
still use spreadsheets to track third party issues.</p>
<p>While the growing number of third-party related breaches points to
the critical need for healthcare providers to establish third-party
cyber risk management programs, it also reveals the magnitude of the
challenge for business associates.</p>
<p>Answering questionnaires from a multitude of upstream business
partners is time consuming and costly. Wouldn't it be easier on everyone
if an exchange existed to prevent the repetitive security
questionnaires and on-site visits? How about performing one security
assessment, updating it frequently and sharing with all upstream
business partners?</p>
<p>This article examines those challenges and prescribes strategies both
customers and third parties should take to streamline the assessment
process their customers require.</p>
<p><strong>Third-party cyber risk management: Four key strategies</strong></p>
<p>It's imperative that you move from a compliance-focused to risk-based
strategy. Emailing a questionnaire to your third parties and storing
them in your GRC tool is not enough. Without a risk-based process, you
will continue to struggle answering the most important question, "Which
of my third parties pose the most risk to my enterprise today based on
the current threat landscape?"</p>
<p>Here are four key components of a sound strategy and the questions
you should ask yourself to help reduce complexity, costs and risk from
your digital ecosystem of third parties:</p>
<p>1. Identify – Maintain an updated and dynamic inventory of your third
parties: Ensure you have a complete view of your third parties and the
changing nature of 1) your business relationship with each and expansion
or contraction in your relationship, and 2) their business changes –
acquisitions, divestitures and potential breaches.<br>1.1. How can you
work with lines of business to ensure you're being included in the RFP
stage – rather than after the third party contract has been signed?<br>1.2. Is the proper contract language being included that provides assessment rights?<br>1.3. How are you alerted when your relationship with one of your third parties changes?</p>
<p>2. Assess – Understand your inherent risk from each third party. As
part of your overall strategy, ensure that you dynamically document
inherent risk from your digital ecosystem.<br>2.1. What risk do you have from each of your third parties?<br>2.2. What impact would you incur if they were breached?<br>2.3. How do you interact with each?<br>2.4. Do they have access to your customers' data?<br>2.5. Do you access their systems?<br>2.6.
Do you access a payment portal or any other systems? Do you provide a
critical component in your customer's manufacturing process?</p>
<p>3. Mitigate — Tier your third parties and do proper – and continuous –
security due diligence on each. Different levels of relationships and
access require different levels of due diligence. Trust (i.e.,
self-questionnaire) is not as accurate as verify (a validated
assessment). Understand that point-in-time assessments likely meet
regulations, but do not provide true risk management oversight. Work
with your third parties to remediate critical issues in a timely
fashion.<br>3.1. Which of your third parties require a fully validated evidence of controls assessment?<br>3.2. Which only require self-questionnaires?<br>3.3. How are you prioritizing which of your third parties need the most attention based on the latest attack vectors?<br>3.4. Which need no assessment at all?<br>3.5. How often are you updating your assessments?<br>3.6. Are you seeing an inside/out and outside/in view of their security posture?<br>3.7. Do you have outstanding remediation issues from your third parties?</p>
<p>4. Monitor and Collaborate – Your third-party portfolio must be
continuously monitored for state changes. Collaborate with your third
parties to improve their security posture and lower your risk. Use
analytics to monitor new threats that exploit weaknesses in your third
parties' controls. Communicate effectively with your third-party
portfolio to understand your exposure to recent threats.<br>4.1. What type of analytics are you running against your third party assessments?<br>4.2. How do you know which of your third parties pose the most risk to your organization?<br>4.3. Are you correlating threat intelligence with weak controls in your third party portfolio?</p>
<p><strong>Third Parties – Streamlining the Response Process</strong></p>
<p>Fueled by rapidly changing regulatory and threat landscapes, the
swift evolution of third-party cyber risk management has caused third
parties to feel under siege. For instance, most vendor pain points
emanate from three attributes that have come to define today's risk
management strategies: complexity, cost and compliance vs. risk
management.</p>
<p>1. Remove Complexity —</p>
<p>Problem: Organizations use different data gathering questionnaires
and assessment methodologies - often customized to meet their unique
needs. Third parties are being asked to complete many different flavors
of assessments – some self-attestation, others on-site assessments.</p>
<p>Solution: Reduce complexity by proactively building into contracts
with your up-stream partners the ability to proactively provide them a
standardized assessment on a quarterly basis. Be assessed once, share
with many.</p>
<p>2. Reduce Costs —</p>
<p>Problem: It's expensive and time consuming to complete a multitude of
questionnaires – all asking basically the same questions – many times
in a calendar year.</p>
<p>Solution: Reduce costs by providing up-stream partners a
comprehensive and up-to-date assessment at defined intervals.
Proactively ensure them that you're not susceptible to newly released
cyberattacks. Use your excellent security posture as a business enabler
to win business and increase revenue.</p>
<p>3. Mitigate Risk –</p>
<p>Problem: The majority of third-party cyber risk assessment requests
are geared toward compliance, as opposed to taking risk-based approaches
to identify and mitigate real issues based on actual threats and
countermeasures.</p>
<p>Solution: Follow security best practices by asking "what threats am I
exposed to? How do I need to mitigate against that? And what's the next
thing I need to be worried about?" That context is key to adopting a
risk-based vs. compliance-based approach to addressing cyber risk
exposure.</p>
<p>Having safeguards and a strategy in place specific to third-party
cyber risk management have never been more crucial to mitigating risk
from your digital ecosystem. As reported by the Ponemon Institute,
nearly 75 percent of IT executives surveyed agree that third-party risk
is serious, while 21 percent of respondents said the risk is
significantly increasing.</p>
<p>To understand and implement a successful third-party cyber risk
management strategy, companies must fully understand the risks a third
party poses to them based on the nature of their relationship;
understand the controls that a third party has in place to mitigate
risk; collaborate with the third party to achieve an acceptable risk
posture; and continuously monitor the security posture of the third
party over time. Only then does an organization have visibility into
their entire risk portfolio that business associates present.</p><br></div>