Executive Summary
OVERVIEW
In an era where interconnectedness drives progress, it also fuels new vulnerabilities, particularly through third-party partnerships. These relationships, critical for operations, often harbor hidden risks in the supply chain that remain unnoticed until attackers exploit them.
Through an exploration of pivotal incidents and emerging trends from 2024, this report delves into the evolving dangers of third-party cyber incidents that cause widespread impact and systemic risks. It offers actionable recommendations to help businesses fortify their third-party risk management (TPRM) strategies and build stronger, more resilient defenses against an ever-changing threat landscape.
![](https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/randsomware.ee597c49a0d6.png?ext=webp)
Ransomware as a Dominant Threat:
Third-party vectors played a central role in ransomware campaigns, triggering widespread disruptions across healthcare, manufacturing, and retail.
![](https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/network_bug.dc678e3219f5.png?ext=webp)
Unauthorized Network Access:
Accounting for 51.7% of publicly disclosed incidents, unauthorized network access remained a pervasive issue, often linked to misconfigurations and weak access controls.
![](https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/login.570830b8dd2c.png?ext=webp)
Credential Misuse and Software Vulnerabilities:
Credential misuse and delayed patching of vulnerabilities, including zero-day exploits, emerged as critical challenges in securing third-party systems.
![](https://assets.foleon.com/eu-central-1/de-uploads-7e3kk3/50219/global.3d19d0ab6459.png?ext=webp)
Industry Impacts:
Healthcare, finance, manufacturing, and retail sectors bore the brunt of these incidents, with cascading effects that disrupted supply chains and eroded stakeholder trust.
Lessons Learned
- Enhanced Supplier Security: Incidents such as the Cleo File Transfer ransomware campaign emphasized the need for stronger supplier network security.
- Proactive Risk Management: Tools like Black Kite’s FocusTags™, Supply Chain module, and Ransomware Susceptibility Index® (RSITM) proved instrumental in identifying and mitigating vendor-related risks.
- Regulatory Compliance as a Catalyst: Frameworks like GDPR, HIPAA, and DORA drove significant improvements in incident response and vendor risk management practices.
Recommendations
- Strengthen Vendor Cybersecurity Practices: Implement robust risk assessments, enforce contractual security requirements, and promote vendor training.
- Adopt Proactive Monitoring: Use tools like FocusTags™ and Black Kite Bridge™ for real-time insights and rapid incident response.
- Leverage Incident Learnings: Conduct post-incident reviews and integrate findings into future preparedness strategies.
Black Kite’s Contributions
Black Kite played a pivotal role in empowering organizations to navigate the challenges of 2024 through:
- FocusTags™: Actionable intelligence tailored to vendor-specific risk mitigation.
- Advanced Modules: Tools like RSI™, Cyber Rating, and Financial Cyber Risk Quantification (CRQ) that facilitate proactive risk management.
- Collaborative Platforms: Seamless vendor engagement enabled by the Supply Chain module and Black Kite Bridge™.