CFOtech New Zealand logo
Technology news for Kiwi CFOs and financial decision-makers
Story image

New Zealand – let’s get your IT supply chain secured!

By Contributor
Mon 17 Jan 2022

Article by Lateral Security, IT security advisory consultant, Jan Klinkner.

Attacks via the IT supply chain are steadily increasing over recent years. Annual cyber reports in 2020 stated up to 40% of breaches originate from weak IT supply chains. Prominent incidents lately, with hits against SolarWinds and Kaseya, have gained a lot of attention and served as a wake-up call for many who have not yet paid much attention to this control area.

Interestingly, although the dependence on third party providers is constantly growing, this area still appears to be a blind spot for many organisations and individuals.

What is an IT supply chain?

Since it is nearly impossible to create, run, and produce everything in-house, having a supply chain that integrates third-party products and services into the own production and service delivery, is widespread. 

Accordingly, an IT supply chain is the integration of IT services and products delivered by external providers. This can occur in different ways, including hardware, software, IT support, managed or cloud services.

As IT is an essential part of nearly every business nowadays, the IT supply chain has become a self-evident part of most companies' BAU. Maybe too self-evident - since understanding and treating IT as a proper mean of production is not necessarily a common practice. And while quality assurance has long been established on the traditional supply chain, the identification, acquisition, and consumption of IT products and services often still appears more like a gut's driven boxing day shopping trip.

What risks lurk in the IT supply chain?

Caring about the IT supply chain is not only a business issue. It concerns almost everyone who has some piece of IT and relies on it to complete important tasks in daily life. An obvious example is everyone's private smartphone. It commonly enables essential activities like communication, banking, payments, trading, smart home management, navigation, entertainment, scheduling, and notifications. As such, losing one's smartphone for a few days would potentially create serious issues for many people.

For businesses, the matter is usually more complex. It, of course, depends on a lot of factors, including what kind of business it concerns and how extensive the integration of and dependency on third-party IT products and services is. 

On reflection, it is not surprising that assessing risks in this context is complex and requires various, comprehensive, and detailed considerations. It is essential to understand where and how much a third-party IT service or product is involved in a certain business context and what negative impact their failure can have on affected business processes and information associated with it, and the business overall. Worst case, life and existence might be lying in IT suppliers' hands.

It is also worth considering the unique situation and geolocation of New Zealand and the global and domestic market of available IT services and products. No question, there are capable local Kiwi IT suppliers and (cloud) service providers, and numerous international brands have offices and branches in New Zealand too. However, by far the biggest share of IT vendors, suppliers, and providers are based overseas, and their product and service provision often occurs from offshore. Keeping this in mind, aspects like data sovereignty and the consideration of specific legislative and political risks come into play.

Additionally, regarding IT supply chain risks, it is important to understand the following fact: You can outsource IT services and functions, but you cannot outsource responsibilities for related risks. You will ultimately remain in charge of all failures in your IT supply chain.

Hence it is imperative to take ownership of this matter. Be prepared, identify, understand, manage, and appropriately treat IT supply chain risks end-to-end, like any other relevant business risk.

What can Kiwis do to secure their IT supply chain?

It is always good to start with asking the right questions, understanding the current situation, and then taking appropriate actions in both personal and business contexts.

When choosing a personal smartphone, some driving questions might be: Is it trendy? Is it functional? Is it cheap? However, since the importance of a smartphone for many people's daily lives is evident, it is worth asking a few more specific questions here and making some further considerations to ensure the device comes with certain reliability. For example: Can the manufacturer and the device be trusted? What is their reputation? What are their terms and conditions and their privacy policy? 

With these types of questions, an informed decision can be made while choosing a phone.

In a business context, the general line of thinking and approaching the issue is comparable but might require more structure and diligence. For example, the acquisition of IT services and products are predominantly driven by business, operational and functional considerations – while security considerations often come short in this process.

Establishing a secure IT supply chain is by no means a simple one-off task, rather an ongoing process. Start with implementing some initial checkpoints and measures which can already achieve improvements with reasonably low effort. And then successively add further safeguards and controls to bring a comprehensive, reliable, and sustainable supply chain security assurance process into effect.

Such a stepwise approach can be structured as follows:

1. Understand your IT supply chain

  • Identify and record all IT suppliers involved in your business and integrated in your service and product delivery. Consider including suppliers of your suppliers.
  • Identify if, where and to what extent these suppliers, and their IT products and services, may introduce risks to your business and create a register of identified risks.

2) Treat your supply chain risks

  • Define a set of baseline controls and measures, e.g. in the form of IT supplier security management policy, that are applicable for IT suppliers and providers you engage with.
  • Include your security requirements in IT service agreements with third parties.
  • Assess identified IT supplier-related risks and oblige vendors to apply remediation where assessed risk postures do not meet your expectations.

3) Measure and manage your IT supply chain security posture

  • Establish a process to continuously manage IT supplier-related risks, including regular reviews and reassessments.
  • Oblige your IT suppliers to provide independent IT security assurance reviews and attestations.
  • Establish a process of monitoring and reporting of IT suppliers' security performance based on defined security KPIs reflecting your baseline security expectations.
  • Make sure you have an exit strategy to be prepared for a switch of provider, where this becomes necessary.

Concluding with some good news

No one needs to reinvent the wheel here, of course. There are many guidelines and templates available in the public domain (e.g. see CERT NZ or PSR websites). Most of them are helpful, and it is always reasonable to shop around, compare and collect what is most suitable for the own context. Please make good use of it!
 

Related stories
Top stories
Story image
Artificial Intelligence
SAS announces new products amid cloud portfolio success
Analytics and AI company SAS is deepening its broad industry portfolio with offerings that support life sciences, energy, and martech.
Story image
Customer experience
Research unveils precarious customer loyalty for retailers
New research has found customers are reassessing established brand loyalties as their priorities and behaviours shift.
Story image
Cybersecurity
NCSC advisory highlights poor security configurations
The GCSB's National Cyber Security Centre (NCSC) has released a cyber security advisory identifying commonly exploited controls and practices.
Story image
Digital Transformation
Trading up: It's time to swap core systems for flexible digital applications
This year will see more oranisations planning and commencing high tech renovations that will shake up the way they operate.
Story image
Sisense
Data and analytics could be key to higher selling prices in APAC
Sisense's latest report has found that almost half of data professionals in APAC think customised data and analytics can create better selling prices for their products.
Story image
MongoDB
Tech innovation crucial to growth, but barriers remain
Businesses in the A/NZ region believe tech innovation is crucial to drive future growth, but 76% say they’re being held back by complex data architecture.
Story image
Microsoft
Avaya expands Microsoft partnership to deliver OneCloud on Azure
The joint technology and go to market agreement will help customers accelerate their digital transformation initiatives in the cloud.
Story image
Artificial Intelligence
SAS launches human-focused responsible innovation initiative
SAS has launched a responsible innovation initiative, furthering its commitment to equity and putting people first.
Story image
Safety
Voxel hits total funding of $18M following ongoing wins
Since raising its seed round in September, Voxel has grown at pace, by decreasing on-site injuries by upwards of 80% and increasing operational productivity.
Story image
Artificial Intelligence
Updates from Google Workspace set to ease hybrid working troubles
Google Workspace has announced a variety of new features which will utilise Google AI capabilities to help make hybrid working situations more efficient and effective.
Story image
Artificial Intelligence
CFOs using digital workers and AI to prevent unnecessary loss
New technology is now allowing CFOs to use digital workers to automate their accounting processes, making it easier for them to avoid unnecessary losses.
Story image
SaaS
Cloudflare launches instant serverless database for dev teams
"Today we’re announcing our first serverless database which we expect will quickly become one of the largest databases in the world."
Story image
Sift
Sift shares crucial advice for preventing serious ATO breaches
Are you or your business struggling with Account Takeover Fraud (ATO)? One of the latest ebooks from Sift can provide readers with the tools and expertise to help launch them into the new era of account security.
Story image
Artificial Intelligence
SAS unveils AI experience to improve kids' batting abilities
SAS has created The Batting Lab, an interactive experience using AI, computer vision and IoT analytics to help kids improve their baseball and softball swings.
Story image
Remote Working
IT teams deploy powerful technologies to enable remote work
"We found that IT teams mastered the challenges of remote work last year in large part by employing powerful yet easy-to-use technologies."
Story image
Microsoft
SAS Viya on Microsoft Azure to deliver 204% return - study
The Forrester Total Economic Impact study finds SAS Viya on Microsoft Azure brings a 204% return on investment over three years.
Story image
Excel
Could your Excel practices be harming your business?
While Excel has been the de-facto standard for budgeting, planning, and forecasting, is it alone, enough to support organisations in the global marketplace that’s facing rapid changes due to digital transformation?
Story image
Amazon Web Services / AWS
Databricks strengthens AWS partnership with new Lakehouse offering
Customers will experience faster onboarding and unified account administration to make building a Databricks Lakehouse on AWS easier.
Story image
Microsoft
PwC NZ unveils new Cloud Security Operations Center
PwC New Zealand has unveiled its new Cloud Security Operations Center for the entire Microsoft technology stack.
Story image
Attain
Revenue operations is taking centre stage
As the business world continues to evolve, new demands need to be met to keep up with the ever-changing landscape. 
Story image
Digital Transformation
Unlocking the next digital frontier for educational institutions
Understanding where to invest in technology can be challenging for education institutions, especially after the COVID-19 disruptions.
Story image
Artificial Intelligence
Clear Dynamics closes $35M funding round, invests in global growth
The funding is a major milestone and speaks to Clear Dynamics’ vision for AI-enabled ‘composable’ enterprise software, the company states.
Story image
Cryptocurrency
Prominent cryptocurrency trader hit by 'perfect storm'
A leading local crypto currency trading platform, BitPrime, says a "perfect storm" has hit its finances, forcing it to put a halt on operations.
Story image
Tech job moves
Tech job moves - Datacom, Micro Focus, SnapLogic and VMware
We round up all job appointments from May 6-12, 2022, in one place to keep you updated with the latest from across the tech industries.
Story image
Cybersecurity
Hard numbers: Why ambiguity in cybersecurity no longer adds up
As cybersecurity costs and risks continue to escalate, CEOs continue to struggle with what their investment in cyber protection buys. Getting rid of ambiguity becomes necessary.
Story image
Commerce Commission
ComCom welcomes new marketing codes for the telecom industry
The Commerce Commission is welcoming the creation of new marketing codes for the telecommunications industry.
Story image
Employee Experience
Zendesk launches customer service and employee experience offering
"Zendesk is helping businesses embrace this new generation of conversational customer relationship management and turn customer service into growth.”
Story image
Microsoft
Microsoft unveils adaptive accessories for disability access
Microsoft is introducing an expansive Inclusive Tech Lab to give people with disabilities greater access to technology through new software features and adaptive accessories.
Story image
Employee Retention
Company values increasingly important in post-pandemic world
New research released today reveals that company values are the new currency when it comes to employee retention in a post-covid economy.
Story image
Adyen
Adyen expands partnership with Afterpay as BNPL payments increase
Adyen has expanded its partnership with AfterPay allowing more of Adyen’s merchants in more countries worldwide to use the BNPL provider.
Story image
Digital Transformation
Why enterprise records management should be part of any digital transformation strategy
Modern organisations create and rely upon an enormous volume of content, and digital records make up a significant proportion of that content.
Story image
Public Cloud
Cloud adoption still a work in progress, NetApp finds
NetApp has announced the results of the annual Cloud Infrastructure Report based on a survey of public cloud business and IT decision makers.
Story image
Commerce Commission
ComCom appeals $2.25 million fine in Vodafone FibreX case
The Commerce Commission has filed an appeal in the High Court against a $2.25 million fine imposed on Vodafone NZ for its offending under the Fair Trading Act.
Story image
Remote Working
How organisations can meet employees' changing expectations
The global employment market has shifted dramatically in favour of employees, sparking the so-called great resignation, in which people are leaving unsatisfying roles in search of greener pastures.
Exabeam
Find out how a behavioural analytics-driven approach can transform security operations with the new Exabeam commissioned Forrester study.
Link image
Story image
Phishing
Google reveals new safety and security measures for users
Google's new measures include automatic two step verification, virtual cards and making it easier to remove contact information on Google Search results.
Story image
Ransomware
A third of companies paying ransom don’t recover data - report
Veeam's report finds 76% of businesses who are victims of cyberattacks paid the ransom to recover data, but a third were still unable to get their information back.
Story image
Mobility
Hands-on review: STM laptop bags
The advent of hybrid working has meant we need laptop bags. We got our hands on two of the most popular laptop bags from STM.
Story image
Kodari Securities (KOSEC)
NFT trends and opportunities: expert reveals all
The NFT market is growing at an exponential rate, with unprecedented liquidity. Here we explore how businesses can profit.
Story image
Jabra
Jabra investigates what makes an ideal hybrid work model
“The way we work has changed forever and the current state of knowledge work requires access to digital platforms and technologies to be successful."
Story image
Talend
Talend introduces new data health solutions for businesses
Talend has announced its latest version of Talend Data Fabric, with the release of Talend Trust Score enabling data teams to establish a foundation for data health.
Story image
Avaya
Avaya OneCloud sees 118% ARR growth for second quarter 2022
Avaya Holdings has reported $750 million annual recurring revenue (ARR) for its OneCloud offering, up 21% sequentially and 118% from the same period last year.
Story image
Artificial Intelligence
ForgeRock releases Autonomous Access solution powered by AI
ForgeRock has officially introduced ForgeRock Autonomous Access, a new solution that uses AI to prevent identity-based cyber attacks and fraud.
Booster
Booster Innovation Fund. A fund of Kiwi ingenuity – for Kiwi investors.
Link image