If you liked this webinar, you may also be interested in:
Feb 11, 2025
Vendor risk management is a cornerstone of safeguarding sensitive data and systems, particularly in sectors like healthcare, where protecting patient information is crucial. Despite best efforts, significant blind spots often remain in vendor risk assessments. These vulnerabilities stem from incomplete vendor inventories, prioritization challenges, and a lack of visibility into downstream risks. Understanding and addressing these gaps is critical to bolstering enterprise security.
The scope of the problem
Most organizations struggle to achieve full visibility across their vendor portfolio. Risk assessments often cover only a small fraction of the total number of vendors servicing the organization. This limited scope is largely driven by difficulties in accurately identifying all vendors and the necessity to focus resources on those perceived as most critical. Consequently, vendors that are not deemed mission-critical or high-risk are often overlooked, leaving hundreds of vendors unassessed. This creates significant blind spots, especially in a healthcare environment where even low-risk vendors could inadvertently compromise patient data or systems.
Fourth-party risks amplify the challenge
The problem extends beyond third-party vendors to the broader supply chain. The emergence of vulnerabilities and breaches in fourth-party products and services, such as the Log4j vulnerability, the SolarWinds attack, and the Okta compromise, underscores the cascading risks organizations face. These incidents highlight a troubling reality: many third-party vendors do not maintain accurate inventories of their own supply chain products. This lack of transparency means organizations are often unaware of their exposure to downstream vulnerabilities.
For example, a vendor may rely on a software library that contains a critical vulnerability, yet this dependency remains unreported or undiscovered. In such cases, organizations are blind to the risks posed to their critical data and applications, compounding the difficulty of implementing effective remediation strategies.
Prioritization and risk triage fall short
When faced with limited resources, organizations understandably prioritize vendors based on criticality. Mission-critical vendors and those presenting the highest inherent risks receive the most attention. However, this approach leaves out less obvious forms of risk that can still have significant consequences.
For instance, vendors with remote access to systems, those with physical access to facilities, or those managing privileged accounts might not be classified as critical but can still introduce substantial vulnerabilities. These forms of access can be exploited by malicious actors to bypass traditional security measures, emphasizing the need for a broader view of what constitutes risk.
Addressing the blind spots
To mitigate these gaps, organizations must adopt a more comprehensive and dynamic approach to vendor risk management. Here are some key strategies.
- Develop a comprehensive vendor inventory: Organizations need complete and accurate inventory of all vendors servicing their operations. This requires cross-departmental collaboration and the use of automated tools to identify and catalog vendors.
- Enhance visibility into fourth-party risks: Working with third-party vendors to improve transparency in their supply chains is critical. Organizations should mandate that vendors maintain detailed inventories of their own dependencies and report any vulnerabilities promptly.
- Adapt assessments based on threat intelligence: Incorporating real-time threat intelligence into vendor assessments allows organizations to adapt risk evaluations based on the latest cyber threat landscape. This approach ensures that assessments account for emerging vulnerabilities, attack vectors, and threat actors targeting specific industries or systems. Organizations can identify which vendors are most susceptible to active threats and prioritize remediation efforts by leveraging threat intelligence.
- Leverage technology and automation: Advanced risk management platforms can help organizations streamline vendor assessments, prioritize risks more effectively, and monitor for vulnerabilities in real time. Automation can also reduce the burden on internal teams, enabling them to focus on higher-value tasks.
- Adopt continuous monitoring: Risk management cannot be a one-time effort. Continuous monitoring of vendors, their supply chains, and emerging vulnerabilities is essential for maintaining an up-to-date risk profile.
- Foster collaborative risk mitigation: Establishing strong partnerships with vendors can lead to more proactive risk mitigation. Vendors should be treated as extensions of the organization’s security ecosystem, with clear expectations for compliance and risk management practices.
Conclusion
The blind spots in vendor risk assessments present significant challenges to enterprise security, particularly in high-stakes environments like healthcare. By addressing gaps in vendor inventories, improving visibility into fourth-party risks, and expanding risk assessment criteria, organizations can enhance their resilience against emerging threats. While the task may seem daunting, a proactive and collaborative approach can transform vendor risk management from a reactive necessity into a strategic advantage.
Vendor Risk Assessments: Addressing Blind Spots in a Complex Landscape Vendor Risk Assessments: Addressing Blind Spots in a Complex Landscape
Feb 3, 2025
The Digital Operational Resilience Act (DORA), passed by the European Union, marks a significant shift in how businesses manage and mitigate digital risks. Aimed primarily at financial institutions and critical service providers, DORA is designed to ensure that these entities remain operationally resilient despite digital disruptions, cyberattacks, and system failures.
What organizations are subject to DORA?
DORA impacts a wide range of entities, including
- Banks and financial institutions
- Payment processors and providers
- Insurance firms
- Information and Communications Technology (ICT) third-party service providers
- Investment firms
These organizations must adhere to DORA to safeguard the EU’s financial system from the cascading effects of digital disruptions.
What does DORA require for compliance?
DORA compliance revolves around several core pillars.
- Risk Management: Organizations must implement comprehensive risk management frameworks that cover all aspects of their digital operations, from data integrity to security of systems.
- Incident Reporting: Institutions must establish a protocol for reporting significant digital incidents, ensuring that appropriate authorities are notified within specific timeframes.
- Testing: Regular testing of ICT systems is mandatory to ensure resilience against potential vulnerabilities.
- Operational Resilience Plans: Businesses need well-documented and executable plans to continue operations in the event of significant disruptions.
- Vendor Risk Management: One of the most stringent aspects of DORA is the focus on third-party vendor risk. Financial institutions must scrutinize their ICT third-party providers to ensure compliance with resilience standards. Vendor relationships need to be assessed, monitored, and managed to avoid introducing vulnerabilities into the organization.
The stringency of vendor risk management
DORA’s provisions for vendor risk management are particularly rigorous. Businesses must not only vet their vendors carefully but also have continuous oversight of their performance and compliance. Third-party providers must meet specific resilience standards, and contracts with these vendors must reflect the organization’s commitment to minimizing digital risk exposure. This heightened focus on third-party risk places significant responsibility on businesses to extend their operational resilience beyond their internal systems.
DORA roll-out: A phased approach to compliance
The roll-out of the EU’s DORA regulation is scheduled through January 2025. Key dates for businesses include
- January 2023: DORA was formally adopted by the EU, marking the beginning of the awareness and preparation phase.
- January 2025: This is the deadline by which businesses must be fully DORA compliant. By this date, financial institutions and relevant ICT service providers will be expected to implement the necessary frameworks and systems for digital operational resilience, including risk management, incident reporting, and vendor oversight.
- Ongoing: Post-2025, supervisory authorities will start stringent enforcement, conducting audits and assessments to ensure continuous DORA compliance. Businesses will be required to regularly test their ICT systems, report significant incidents, and manage vendor risk proactively.
Organizations should update internal processes and make sure that they align with DORA’s standards to avoid penalties and ensure operational resilience.
HITRUST: Supporting DORA compliance
In this iteration of the HITRUST CSF, businesses will have the ability to assess and manage their DORA compliance efficiently. HITRUST, with its comprehensive risk management framework, will enable organizations to align with DORA’s requirements, particularly in areas like vendor risk management and operational resilience. As DORA continues to set the benchmark for operational resilience across the EU, HITRUST will ensure that businesses are equipped to meet these expectations, simplifying the certification process and maintaining the highest standards of security, privacy, and supply chain risk.
Understanding the EU’s DORA Regulation: What It Means for Businesses Understanding the EU’s DORA Regulation: What It Means for Businesses
Jan 29, 2025
As AI continues to gain momentum, organizations face new risks, challenges, and security concerns. In response, HITRUST launched two comprehensive AI assurance solutions in 2024.
1. HITRUST AI Risk Management Assessment
2. HITRUST AI Security Assessment and Certification
Let’s explore.
Common features
Before diving into each solution’s unique attributes, it’s important to note that both AI Risk Management and AI Security Assessments share several foundational HITRUST capabilities.
-
Prescriptive, harmonized controls
Each AI assessment leverages HITRUST’s rigorous, prescriptive controls built on a harmonized framework that reflects leading standards such as ISO/IEC 23894:2023, NIST RMF, and more.
-
Cyber threat-adaptive framework
HITRUST regularly updates control sets to address evolving AI threats. This continuous refinement ensures that both AI assessments stay current with emerging risks.
-
Powered by MyCSF
Both solutions use HITRUST’s SaaS platform, MyCSF, enabling organizations to efficiently manage assessments and securely share results and reports with stakeholders.
-
Credibility and reliability
HITRUST has an established track record in cybersecurity assurance, providing globally recognized methodologies that organizations of all sizes can trust.
HITRUST AI Risk Management Assessment
Purpose
The HITRUST AI Risk Management Assessment is designed for organizations seeking a targeted evaluation of their AI risk management practices.
Key features
- Non-certified solution: Evaluates AI risk management without the formalities of a certification process
- 51 AI-specific controls: Focuses on AI risks based on 51 controls, helping you pinpoint vulnerabilities and prioritize improvements
- Self-evaluation: Allows flexibility to perform a standalone self-assessment or engage a HITRUST External Assessor for independent testing
- Cost-effective entry point: Offers a cost-effective way to begin identifying and addressing AI-related risks
- AI RM Insights Report: Delivers clear, detailed scoring mapped to ISO/IEC 23894:2023 and NIST RMF v1.0, including color-coded scorecards, gap analysis, and next-step recommendations
Ideal for
- AI users and producers looking for a flexible approach to assess AI risks
- Organizations wanting a low-barrier, targeted way to identify AI gaps
- Teams looking to create or refine an AI risk management program but not yet ready to pursue formal certification
HITRUST AI Security Assessment and Certification
Purpose
The HITRUST AI Security Assessment and Certification is a higher-level assurance solution that validates the security of AI systems in a formal manner.
Key features
- Certified validation: Results in a HITRUST AI certification that demonstrates the highest level of security assurance to stakeholders
- 44 security controls: Focuses on the security and privacy of AI platforms with 44 controls, which can be tailored based on specific use case scenarios
- Independent, centralized quality review: Includes third-party validation and centralized quality review, demonstrating rigorous testing and reliable results
- Inheritance: Allows to inherit AI controls from cloud service providers and other vendors that already have HITRUST-certified systems
- Seamless add-on to HITRUST cybersecurity assessments: Can be added to any of HITRUST’s core assessments (e1, i1, r2), ensuring comprehensive coverage of both cybersecurity and AI security in a unified approach
Ideal for
- AI developers and deployers seeking a formal certification that can be shared with customers, regulators, and partners
- Organizations looking to align AI security controls with recognized frameworks (e.g., NIST, ISO/IEC, OWASP) and consolidate compliance efforts
- Teams that proactively want to stay ahead of new AI security threats
Which one is right for you?
If you’re exploring AI risks, processes, and gaps, choose the HITRUST AI Risk Management Assessment to gain deep insights without the pressure of achieving certification. This approach offers an entry point to identify AI risks and build a roadmap for improvement cost-effectively.
If you need formal recognition, choose the HITRUST AI Security Assessment and Certification to showcase a validated, independently reviewed AI security posture. This ensures your stakeholders have the assurance they need regarding your organization’s AI security readiness.
Bottom line
HITRUST’s AI assurance addresses the evolving landscape of AI risk, compliance, and security. You will benefit from HITRUST’s proven framework, advanced tools, and industry-leading approach whether you opt for the AI Risk Management Assessment or the AI Security Assessment.
HITRUST’s flexible solutions help ensure AI technologies are deployed responsibly, securely, and with optimal risk management no matter your organization’s size or AI maturity. Choose the solution that best aligns with your goals — risk-focused or security-focused — to confidently navigate the complexities of AI adoption while meeting stakeholder expectations for transparency and assurance.
Visit the HITRUST AI Hub for more information on how HITRUST can help you secure, manage, and certify your organization’s AI systems.