No Result
View All Result
SUBSCRIBE | NO FEES, NO PAYWALLS
MANAGE MY SUBSCRIPTION
NEWSLETTER
Corporate Compliance Insights
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe
Jump to a Section
  • At the Office
    • Ethics
    • HR Compliance
    • Leadership & Career
    • Well-Being at Work
  • Compliance & Risk
    • Compliance
    • FCPA
    • Fraud
    • Risk
  • Finserv & Audit
    • Financial Services
    • Internal Audit
  • Governance
    • ESG
    • Getting Governance Right
  • Infosec
    • Cybersecurity
    • Data Privacy
  • Opinion
    • Adam Balfour
    • Jim DeLoach
    • Mary Shirley
    • Yan Tougas
No Result
View All Result
Corporate Compliance Insights
Home Featured

Scaling Cyber Supply Chain Risk Management with Dark Web Monitoring

by Anju Chopra
October 2, 2018
in Featured, Risk
Scaling Cyber Supply Chain Risk Management with Dark Web Monitoring

Implementing Protections Against Cyberattacks

Many recent cyberattacks have come through exposures in third-party systems. There is an evident need to monitor the cybersecurity of third parties, and this puts the spotlight on cyber supply chain risk management (C-SCRM). Experts from Kroll outline what companies can do to protect their systems and sensitive company information.

with co-authors Brian Lapidus and Keith Wojcieszek 

Many of the high-profile cybersecurity breaches of the last several years share a common, disturbing thread: The breach was not the result of a direct attack on the targeted organization, but instead due to exposures arising from vendors and other trusted third parties. These secondary vulnerabilities allowed bad actors either direct access to the target company’s systems or to sensitive company information that had been entrusted to the vendor.

Unfortunately, the potential security problems raised by interwoven IT systems of vendors, partners, customers and others will only grow more acute. The integration of data across supply chains is a key component of both the digital transformation that is reconfiguring companies in diverse sectors from chemicals to consumer goods, and of emerging technologies such as the internet of things. Furthermore, in addition to increased connectivity between organizations, there is also more connectivity between organizations and individuals, as the boundaries between work and home — and work networks and home networks — continues to erode in today’s “always on” business environment. The result is a massive, growing and porous hyper-network that offers abundant opportunities for sensitive data to be lost, exposed or stolen.

A Spotlight on Third-Party Cyber Risk

The need to monitor the cybersecurity of third parties has put a spotlight on cyber supply chain risk management (C-SCRM). The baseline C-SCRM approach is for companies to require vendors and others to fill out a questionnaire and the review of SOC reports, ISO certifications and similar documents. This information provides a good foundation for vendor assessment. However, it doesn’t measure the state of a company’s cybersecurity so much as the company’s cybersecurity culture. A company that can check these boxes has clearly made the investment in the people and resources necessary for a credible cybersecurity function. But as important as this is, it sheds little light on actual vulnerabilities that may exist.

This is why some companies take an extra step in the due diligence process and have vulnerability scans and penetration tests conducted on vendor systems. This provides a much more tangible assessment of how a vendor system performs under real-world conditions. But scans and tests have their own limitations. They give you a snapshot of the security of the vendor system at that moment, but they don’t say anything about the data held by the vendor that may have made its way outside the vendor’s firewall, whether due to malware or, say, an employee working remotely and using an unsecured Wi-Fi network.

The Role of Dark Web Monitoring

Forward-thinking organizations are responding by incorporating dark web monitoring as the third prong of their cyber supply chain risk management program (see Figure 1).

Dark web monitoring scours unindexed sites, chat rooms and P2P networks that are often hidden behind an anonymizing browser such as Tor and often require special credentials to access. Not surprisingly, the dark web is a hotbed of illicit activity, including the buying and selling of illegal drugs, counterfeit goods and stolen data such as customer credit card and account data, employee data and proprietary corporate information that can range from contracts to sensitive boardroom documents.

Continuous monitoring of the dark web for client provided data that may have originated from vendor systems and of chat-room discussions regarding the vendor adds important insight during both the vendor due diligence process and the working relationship:

  1. It paints a fuller picture of a vendor’s system security that augments security surveys and testing.
  2. Because there is often a considerable time lag between the occurrence of a breach and its discovery, dark web monitoring can provide an invaluable early warning mechanism for breaches of vendor networks.
  3. It helps you develop insight into the extent to which the vendor and its systems are a subject of interest among bad actors and thus of potential future attacks.

Consider the experience of a flag carrier airline that had asked us to monitor its own presence on the dark web. While doing so, we discovered that a sizable batch of the airline’s customer itineraries had been exposed — not due to a breach of its own network, but rather a breach of a travel agency network. Critically, the travel agency was unaware that the breach had occurred.

Fortunately, the breach was discovered, allowing the airline to inform the affected passengers and take other remedial action. Had the airline been conducting dark web monitoring of the information it provided to this and other travel agencies as part of its regular cybersecurity program, it may well have detected this exposure, and other similar vendor network vulnerabilities, even earlier. As an additional method of protection, organizations can monitor key terms, IP addresses and domains provided by their vendors in order to reduce their own risk by better understanding the potential exposures of their third parties.

Extracting Signal From Noise
Comprehensive dark web monitoring platforms combine intelligence gleaned in three ways (see Figure 2).

First, data collection scripts use IP addresses, email addresses, keywords and other information provided by the company to identify data that may have originated with the vendor that is now on the dark web. Artificial intelligence programs then analyze that data to extract signal from noise through disambiguation, contextual analysis and other tools.

The intelligence gathered through these automated methods is then reviewed and further refined by a human analyst, who can add additional information potentially gleaned from conversations in private chat rooms where data may be exchanged for criminal purposes. Being privy to real-time online exchanges between bad actors can provide additional insight on emerging threats and attack vectors. This monitoring can yield actionable intelligence, which can then be used to prioritize and design effective responses. The result is another element to help create the continuous, real-time picture of potential illicit data exposure that goes far beyond the stolen emails and passwords that may capture headlines, but which does not reflect all of the larger strategic risks that come from other types of exposed corporate or customer information.

Because supply chain cyber risk is based on the scope of the vendor-customer data exchange relationship and not necessarily on the size of the vendor, dark web monitoring — which is unobtrusive from the vendor’s perspective and scales easily — should be part of a company’s due diligence process for all vendors, large or small. And because dark web monitoring can be implemented quickly, it can be used as a more immediate source of security insight while security assessments and penetration testing are underway.

As the global connectivity between organizations continues to accelerate, cybersecurity due diligence regarding vendors and other partners will become even more critical to a company’s overall cyber strategy. Adding dark web monitoring to that process provides a holistic view of the culture, systems and data of those third parties — and the potential for early and actionable intelligence regarding cyber threats that might otherwise go undetected.

 

Brian Lapidus is a practice leader in Kroll’s Identity Theft & Breach Notification (ITBN) practice, based in Nashville. Brian helps clients and their advisors, including boards of directors, legal counsel and insurance providers, in resolving the myriad complex issues resulting from a data breach.

 

 

 

Keith Wojcieszek is an Associate Managing Director in Kroll’s Cyber Risk practice, based in Washington, D.C. Keith is a strategic problem-solver who draws on not only his wealth of advanced technical expertise, but also his extensive experience working with diverse international stakeholders on complex transnational investigations and initiatives.


Tags: Artificial Intelligence (AI)Cyber RiskSupply ChainThird Party Risk Management
Previous Post

Procurement and Compliance Getting Closer than Ever

Next Post

Why Process Management is a Boardroom Issue

Anju Chopra

Anju Chopra

Anju Chopra is Senior Vice President, Cyber Technologies, Identity Theft & Breach Notification at Kroll. In a career spanning over 20 years, Anju has been a leader in delivering innovative, often ground-breaking advances in complex technology systems, cybersecurity, artificial intelligence and enterprise architecture. She has particular expertise in developing cybersecurity and identity theft remediation products that integrate artificial intelligence technology. Anju’s strong business acumen and entrepreneurial vision have resulted in strategic solutions that have transformed client services and the internal operations that support them.  

Related Posts

news roundup new

Few Business Leaders Feel Fully Prepared for Challenges of 2025

by Staff and Wire Reports
June 20, 2025

Data center operators not using full slate of available sustainability tactics; companies continue to use AI without policies

robot nurturing a good idea

Innovation vs. Compliance: In the Age of AI, Why Not Both?

by Asha Palmer
June 17, 2025

As governments scramble to regulate AI, forward-thinking companies are writing their own compliance playbooks

human robot working as team pie chart

Smart Machines, Smarter Humans: Why Compliance Still Needs a Human Touch

by Roman Eloshvili
June 17, 2025

From the 2008 financial crisis to everyday judgment calls, the case for keeping humans in the compliance loop

polluted water

PFAS Reporting Window Delayed, but Waiting to Act on ‘Forever Chemicals’ Could Be Risky

by Cally Edgren
June 9, 2025

Technical issues on government portal give companies short reprieve

Next Post
process map

Why Process Management is a Boardroom Issue

No Result
View All Result

Privacy Policy | AI Policy

Founded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security. 

Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls. 

Follow Us

Browse Topics:

  • CCI Press
  • Compliance
  • Compliance Podcasts
  • Cybersecurity
  • Data Privacy
  • eBooks Published by CCI
  • Ethics
  • FCPA
  • Featured
  • Financial Services
  • Fraud
  • Governance
  • GRC Vendor News
  • HR Compliance
  • Internal Audit
  • Leadership and Career
  • On Demand Webinars
  • Opinion
  • Research
  • Resource Library
  • Risk
  • Uncategorized
  • Videos
  • Webinars
  • Well-Being
  • Whitepapers

© 2025 Corporate Compliance Insights

Welcome to CCI. This site uses cookies. Please click OK to accept. Privacy Policy
Cookie settingsACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
No Result
View All Result
  • Home
  • About
    • About CCI
    • CCI Magazine
    • Writing for CCI
    • Career Connection
    • NEW: CCI Press – Book Publishing
    • Advertise With Us
  • Explore Topics
    • See All Articles
    • Compliance
    • Ethics
    • Risk
    • FCPA
    • Governance
    • Fraud
    • Internal Audit
    • HR Compliance
    • Cybersecurity
    • Data Privacy
    • Financial Services
    • Well-Being at Work
    • Leadership and Career
    • Opinion
  • Vendor News
  • Library
    • Download Whitepapers & Reports
    • Download eBooks
    • New: Living Your Best Compliance Life by Mary Shirley
    • New: Ethics and Compliance for Humans by Adam Balfour
    • 2021: Raise Your Game, Not Your Voice by Lentini-Walker & Tschida
    • CCI Press & Compliance Bookshelf
  • Podcasts
    • Great Women in Compliance
    • Unless: The Podcast (Hemma Lomax)
  • Research
  • Webinars
  • Events
  • Subscribe

© 2025 Corporate Compliance Insights