No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Risk

What CrowdStrike Outage Can Teach Us About Vendor Risks

Successful vendor relationships rely on joint understanding of expectations

by Jeff Krull
September 10, 2024
in Risk
crowdstrike building sign

In addition to grounding flights and disrupting hospital operations, CrowdStrike’s July outage brings something else into stark relief: Even the most well-regarded vendor can make a costly mistake. Baker Tilly’s Jeff Krull explores how companies can stay vigilant with regard to vendor risk.

From a risk perspective, organizations are right to be concerned about their technology vendor ecosystem. The CrowdStrike outage was a sobering reminder that despite best efforts in vendor selection and management, service disruptions will occur. There is no turning back; organizations will continue to rely on global IT suppliers and software vendors to keep up with the speed of change and the need for specialized skill sets and services to conduct their business.

Organizations should continue to focus on leading practices when vetting and selecting vendors but recognize that even the largest and most well-regarded IT suppliers and services are vulnerable to both intentional cyber attacks and unintentional errors and disruptions.

CrowdStrike’s July outage caused widespread chaos around the world with flights grounded, broadcasts interrupted and 911 lines disrupted. That a regular software update from a leading provider could cause such issues highlights the growing complexity of interconnected and third-party risks.

Before memory of the outage event fades (and until the next one occurs), all businesses should take the time to carefully evaluate their business continuity and recovery plans, particularly with mission-critical third-party vendors. This includes preparation for various outage scenarios including the most extreme, where the system no longer exists.

Organizations will prepare for and react differently to system outages depending on the business type and risk tolerance. Should an outage occur, organizations are advised to have downtime procedures in place and practice them during off-peak times to ensure that they work and that the company is able to get its systems back online.

Here are steps all organizations should be considering to manage vendor-related business interruption risk:

Identify the risks 

Performing vendor risk assessments is essential to understanding and managing the risk profiles of your vendors and ensuring that the exposures match your organization’s risk tolerance level. A constantly evolving vendor ecosystem means ongoing due diligence into relevant risks before and after a vendor is selected, onboarded and offboarded, as well as understanding how the systems are interconnected.

Establish and test incident response plans

Conduct these tests with key vendors to ensure you are promptly informed and can properly mitigate any risk you may be exposed to by an outage affecting a third-party vendor. This includes understanding the details in your contracts and service-level agreements involving incidents.

crowdstrike
Risk

Risk Lessons From CrowdStrike’s Blunder

by Staff and Wire Reports
July 24, 2024

Organizations continue to grapple with faulty update fallout

Read moreDetails

Conduct training and awareness efforts

Leading organizations are consistently operating tabletop exercises or other real-time training techniques that often dovetail into vendor risk. Ongoing training and support from the top-down assists in maturing an organization and building a more risk-aware culture.

Practice downtime procedures

Organizations should document their downtime procedures and regularly practice them, including practicing how data will be input/recovered once systems are available. This includes flexible or dynamic procedures that are aligned to your organization’s peak or critical operating periods since you may respond differently (e.g., a retailer during the holidays versus a normal month).

Identify and address the need for redundancies to avoid a service disruption

Organizations with large and mission-critical third-party supplier networks that cannot afford interruptions may need to invest in redundancies that will enable them to avoid business interruption and achieve a rapid, full-scale recovery. This can be a costly way to protect against a system outage. Redundancy efforts could include multiple cloud providers and local data centers that provide “hot sites” that are ready to go in the event of a system outage or failure.

The CrowdStrike outage underscores a critical reality: Despite thorough vetting and selection processes, even the most esteemed technology vendors are not immune to disruptions. As organizations continue to depend on a global network of IT suppliers and software vendors to meet the demands of a rapidly evolving business environment, they must remain vigilant and proactive in their risk management strategies.

Ultimately, successful vendor relationships hinge on mutual understanding, collaboration and a clear comprehension of client needs and expectations. By fostering these relationships and continuously improving risk management practices, organizations can better navigate the complexities of their technology vendor ecosystem and safeguard their operations against future disruptions.


Tags: Third Party Risk Management
Previous Post

Vendor Selection & Model Design for FinCrime Compliance Solutions

Next Post

Warning Signs of Embezzlement & Practical Internal Controls

Jeff Krull

Jeff Krull

With more than 20 years of experience in process and controls, information technology and internal audit, Jeff Krull is principal and practice leader of Baker Tilly’s cybersecurity practice. His expertise includes cybersecurity, IT controls, system and organization controls (SOC) examinations internal auditing, business process controls and specialized compliance assessments and attestations. Examples of these engagements include cybersecurity, SOC examinations, Sarbanes-Oxley compliance, internal audit, pre- and post-implementation assessments, privacy and HIPAA risk assessments and specialized compliance attestations for clients.

Related Posts

GAN Integrity TPRM & AI

Where TPRM Meets AI: Balancing Risk & Reward

by Corporate Compliance Insights
May 13, 2025

Is your organization prepared for the dual challenges of AI in third-party risk management? Whitepaper Where TPRM Meets AI: Balancing...

robot reviewing contract

9 Emerging Use Cases for AI in TPRM

by Miriam Konradsen Ayed and Craig Moss
May 6, 2025

(Sponsored) As third-party ecosystems grow more complex, compliance teams face mounting pressure to assess and monitor external relationships effectively. Miriam...

business relationship concept hands

Relationship (Owner) Goals: Why Half Your TPRM Red Flags Stay Hidden

by Chris Audet
April 9, 2025

The front-line staff who manage vendor relationships are uniquely positioned to spot problems before they escalate, yet many organizations fail...

avengers lego figures

Uniting Forces: Cross-Functional Approaches to Insider Threat Prevention

by Rachel L. Gerstein
April 8, 2025

Creating a structured framework that brings together security, HR, IT, legal and compliance teams to fight internal vulnerabilities

Next Post
shady business deal mini figures

Warning Signs of Embezzlement & Practical Internal Controls

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights